Ntshabele, KIsong, BGasela, NAbu-Mahfouz, Adnan MI2023-01-272023-01-272022-09Ntshabele, K., Isong, B., Gasela, N. & Abu-Mahfouz, A.M. 2022. A trusted security key management server in LoRaWAN: Modelling and analysis. <i>Journal of Sensor and Actuator Networks, 11(3).</i> http://hdl.handle.net/10204/125922224-2708https://doi.org/10.3390/jsan11030052http://hdl.handle.net/10204/12592The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight.FulltextenLong-Range Wide-Area NetworkLoRaWANAdvanced Encryption StandardAESAlgorithmsKey securitySecurity modelsSymmetric encryptionA trusted security key management server in LoRaWAN: Modelling and analysisArticleNtshabele, K., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2022). A trusted security key management server in LoRaWAN: Modelling and analysis. <i>Journal of Sensor and Actuator Networks, 11(3)</i>, http://hdl.handle.net/10204/12592Ntshabele, K, B Isong, N Gasela, and Adnan MI Abu-Mahfouz "A trusted security key management server in LoRaWAN: Modelling and analysis." <i>Journal of Sensor and Actuator Networks, 11(3)</i> (2022) http://hdl.handle.net/10204/12592Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM. A trusted security key management server in LoRaWAN: Modelling and analysis. Journal of Sensor and Actuator Networks, 11(3). 2022; http://hdl.handle.net/10204/12592.TY - Article AU - Ntshabele, K AU - Isong, B AU - Gasela, N AU - Abu-Mahfouz, Adnan MI AB - The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight. DA - 2022-09 DB - ResearchSpace DP - CSIR J1 - Journal of Sensor and Actuator Networks, 11(3) KW - Long-Range Wide-Area Network KW - LoRaWAN KW - Advanced Encryption Standard KW - AES KW - Algorithms KW - Key security KW - Security models KW - Symmetric encryption LK - https://researchspace.csir.co.za PY - 2022 SM - 2224-2708 T1 - A trusted security key management server in LoRaWAN: Modelling and analysis TI - A trusted security key management server in LoRaWAN: Modelling and analysis UR - http://hdl.handle.net/10204/12592 ER -37159