12 research outputs found

    LoRaWAN AS PART OF A SMART CITY STRATEGY

    Get PDF
    The LoRaWAN technology is repeatedly mentioned in connection with smart city initiatives, as it moves in the field of connectivity and IoT environment. This paper examines the role of LoRaWAN in smart city strategy and what vulnerabilities are known in the project using LoRaWAN. With help of a concrete use case of the city of Pforzheim (Germany), a SWOT model is set up and tested with experts. From this it can be deduced that the LoRaWAN technology is currently undergoing an interesting development but also has to overcome any hurdles in the urban environment

    Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks

    Get PDF
    The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susceptible to a wide variety of malicious attacks, which can be notoriously difficult to mitigate since gateways are seen as obedient relays by design. These attacks, if not addressed, can cause malfunctions and loss of efficiency in the network traffic. As a solution to this unique problem, this paper presents a novel certificate authentication technique that enhances the cyber security of gateways in the LoRaWAN network. The proposed technique considers a public key infrastructure (PKI) solution that considers a two-tier certificate authority (CA) setup, such as a root-CA and intermediate-CA. This solution is promising, as the simulation results validate that about 66.67% of the packets that are arriving from an illegitimate gateway (GW) are discarded in our implemented secure and reliable solution

    Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks

    Get PDF
    The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susceptible to a wide variety of malicious attacks, which can be notoriously difficult to mitigate since gateways are seen as obedient relays by design. These attacks, if not addressed, can cause malfunctions and loss of efficiency in the network traffic. As a solution to this unique problem, this paper presents a novel certificate authentication technique that enhances the cyber security of gateways in the LoRaWAN network. The proposed technique considers a public key infrastructure (PKI) solution that considers a two-tier certificate authority (CA) setup, such as a root-CA and intermediate-CA. This solution is promising, as the simulation results validate that about 66.67% of the packets that are arriving from an illegitimate gateway (GW) are discarded in our implemented secure and reliable solution

    MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things

    Get PDF
    Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for operating their machines due to untrusted nature of the communication channel. The utilization of internet for managing industrial operations can be widespread adopted if the authentication of the entities are performed and trust is ensured. The traditional schemes with their inherent security issues and other complexities, cannot be directly deployed to resource constrained network devices. Therefore, we have proposed a strong mutual authentication and secret key exchange protocol to address the vulnerabilities of the existing schemes. We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. Performance and security analysis clearly demonstrates that the proposed work is energy efficient (computation and communication inexpensive) and more robust against the attacks in comparison to the traditional scheme

    Огляд та порівняння цифрових алгоритмів захищеної передачі даних в автономних рухомих та стаціонарних системах

    Get PDF
    В роботі обґрунтовано перехід до криптографічно захищених каналів бездротового зв’язку в автоно-мних системах керування як стаціонарного, так і рухомого виконання. Розглянуто можливі вектори атак в таких системах. Виконано аналітичний огляд та класифікацію сучасних алгоритмів криптографічного захисту (шифрування), що використовуються на представницькому, сеансовому та канальному рівнях комунікаційних інтерфейсів разом та наведені функціональні схеми для деяких з них. Виділені критерії для порівняння криптографічних алгоритмів, що дозволяє обирати оптимальний в залежності від виконуваних функцій та умов використання конкретної автономної системи.Autonomous systems based on the "Internet of Things" paradigm have become widespread. The Internet of Things devices are used for collecting and analyzing data, control electrical systems. The Internet of Things the most com-mon fields of use are smart houses, smart cities, smart traffic, environment monitoring, healthcare etc. With the automation to the degree of autonomy of such processes as cargo delivery and human transportation, the Internet of Things paradigm begins to extend not only to stationary devices, but also to mobile, primarily small unmanned aerial vehicles. UAV can be used not only for civil use but for police or military operations too. This poses a potential threat to skilled criminals such as terrorists, smugglers and drug couriers. There is an urgent problem of secure transmission of data and control signals at distances up to tens of kilometers without loss of communication and the possibility of interception of control. Wireless communication technologies are widely used in all areas of the economy: control systems, environmental safety monitoring, industrial automation, logistics, etc. Wireless networks have many characteristics in common with wireline networks, and therefore, many security issues of wireline networks apply to the wireless environment. Wireless data is easy to intercept by potential eavesdroppers. Issue of security and privacy become more notable with wireless networks. The paper substantiates the transition to cryptographically protected wireless communication channels in autonomous control systems for both fixed and mobile performance. Possible attack vectors in such systems are considered. An analytical review and classification of modern cryptographic protection (encryption) algorithms used at the representative, session and channel levels of communication interfaces together and functional diagrams for some of them are performed. Selected criteria for comparing cryptographic algorithms, which allows you to choose the best depending on the functions performed and the conditions of use of a particular autonomous system

    Implementación de Lora y Lorawan como escenario futuro de la industrias 4.0 en el sector agroindustrial peruano

    Get PDF
    El panorama actual del sector agroindustrial exige la inclusión de nuevas tecnologías que contribuyan a solucionar los constantes problemas a los que se enfrenta. Internet of Things se presenta como una alternativa para mitigarlos; sin embargo, las implementaciones de esta tecnología se realizan con el uso de redes de datos tradicionales como Wifi o redes celulares, las cuales representan un alto costo y consumo de energía. En esta investigación se realizó un análisis de la arquitectura y funcionamiento de la tecnología LoRa y el protocolo LoRaWAN, además de plantearse una serie de recomendaciones de cómo implementarla conjuntamente con otras tecnologías emergentes como es el BlockChain, todo esto, aplicado a la agroindustria peruana

    Industrial networks and IIoT: Now and future trends

    Get PDF
    Connectivity is the one word summary for Industry 4.0 revolution. The importance of Internet of Things (IoT) and Industrial IoT (IIoT) have been increased dramatically with the rise of industrialization and industry 4.0. As new opportunities bring their own challenges, with the massive interconnected devices of the IIoT, cyber security of those networks and privacy of their users have become an important aspect. Specifically, intrusion detection for industrial networks (IIoT) has great importance. For instance, it is a key factor in improving the safe operation of the smart grid systems yet protecting the privacy of the consumers at the same time. In the same manner, data streaming is a valid option when the analysis is to be pushed from the cloud to the fog for industrial networks to provide agile response, since it brings the advantage of fast action on intrusion detection and also can buy time for intrusion mitigation. In order to dive deep in industrial networks, basic ground needs to be settled. Hence, this chapter serves in this manner, by presenting basic and emerging technologies along with ideas and discussions: First, an introduction of semiconductor evolution is provided along with the up-to-date hi-tech wired/wireless communication solutions for industrial networks. This is followed by a thorough representation of future trends in industrial environments. More importantly, enabling technologies for industrial networks is also presented. Finally, the chapter is concluded with a summary of the presentations along with future projections of IIoT networks

    Integrated Satellite-terrestrial networks for IoT: LoRaWAN as a Flying Gateway

    Get PDF
    When the Internet of Things (IoT) was introduced, it causes an immense change in human life. Recently, different IoT emerging use cases, which will involve an even higher number of connected devices aimed at collecting and sending data with different purposes and over different application scenarios, such as smart city, smart factory, and smart agriculture. In some cases, the terrestrial infrastructure is not enough to guarantee the typical performance indicators due to its design and intrinsic limitations. Coverage is an example, where the terrestrial infrastructure is not able to cover certain areas such as remote and rural areas. Flying technologies, such as communication satellites and Unmanned Aerial Vehicles (UAVs), can contribute to overcome the limitations of the terrestrial infrastructure, offering wider coverage, higher resilience and availability, and improving user\u2019s Quality of Experience (QoE). IoT can benefit from the UAVs and satellite integration in many ways, also beyond the coverage extension and the increase of the available bandwidth that these objects can offer. This thesis proposes the integration of both IoT and UAVs to guarantee the increased coverage in hard to reach and out of coverage areas. Its core focus addresses the development of the IoT flying gateway and data mule and testing both approaches to show their feasibility. The first approach for the integration of IoT and UAV results in the implementing of LoRa flying gateway with the aim of increasing the IoT communication protocols\u2019 coverage area to reach remote and rural areas. This flying gateway examines the feasibility for extending the coverage in a remote area and transmitting the data to the IoT cloud in real-time. Moreover, it considers the presence of a satellite between the gateway and the final destination for areas with no Internet connectivity and communication means such as WiFi, Ethernet, 4G, or LTE. The experimental results have shown that deploying a LoRa gateway on board a flying drone is an ideal option for the extension of the IoT network coverage in rural and remote areas. The second approach for the integration of the aforementioned technologies is the deployment of IoT data mule concept for LoRa networks. The difference here is the storage of the data on board of the gateway and not transmitting the data to the IoT cloud in real time. The aim of this approach is to receive the data from the LoRa sensors installed in a remote area, store them in the gateway up until this flying gateway is connected to the Internet. The experimental results have shown the feasibility of our flying data mule in terms of signal quality, data delivery, power consumption and gateway status. The third approach considers the security aspect in LoRa networks. The possible physical attacks that can be performed on any LoRa device can be performed once its location is revealed. Position estimation was carried out using one of the LoRa signal features: RSSI. The values of RSSI are fed to the Trilateration localization algorithm to estimate the device\u2019s position. Different outdoor tests were done with and without the drone, and the results have shown that RSSI is a low cost option for position estimation that can result in a slight error due to different environmental conditions that affect the signal quality. In conclusion, by adopting both IoT technology and UAV, this thesis advances the development of flying LoRa gateway and LoRa data mule for the aim of increasing the coverage of LoRa networks to reach rural and remote areas. Moreover, this research could be considered as the first step towards the development of high quality and performance LoRa flying gateway to be tested and used in massive LoRa IoT networks in rural and remote areas

    On the Effects of Forced Trust on Implementations of Small Smart Cities

    Get PDF
    As an increasing number of cities pursue the idea of becoming smart cities, the variety in different approaches to reach this goal also grows. They cover the use of a spectrum of implementations for, inter alia, information systems, smart networks, and public services. In order to operate, these smart cities have to process multiple types of data including personal information. Ultimately, the systems and services that process these data are decided by the city with limited opportunities for their citizens to influence the details of their implementations. In these situations the citizens have no choice but to trust their city with the operation of these systems and the processing of their personal information. This type of a relationship, forced trust, affects the smart city implementation both directly and indirectly. These effects include additional considerations by the city to guarantee the protection of the citizens’ privacy and the security of their personal data, as well as the impacts of forced trust on the willingness of the citizens to adopt the offered services. In this thesis, privacy protection, data protection and security, system reliability and safety, and user avoidance were identified as the four major domains of concern for citizens with regard to forced trust. These domains cover most of the main impacts smart city projects have on their citizens, such as ubiquitous data collection, scarcity of control over the utilisation of one’s personal data, and uncertainty of the dependability of critical information systems. Additionally, technological and methodological approaches were proposed to address each of the discussed concerns. These include implementation of privacy by design in the development of the smart city, use of trusted platforms in data processing, detection and alleviation of potential fault chains, and providing the citizens the means to monitor their personal data. Finally, these recommendations were considered in the context of a small smart city. The Salo smart city project was used as an example and the recommendations were applied to the planned aspects of the upcoming smart city, such as knowledge-based management, a smart city application for information sharing, and increased transparency and justifiability in governance
    corecore