29 research outputs found

    A Dual Key-Based Activation Scheme for Secure LoRaWAN

    Get PDF

    Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks †

    Get PDF
    Abstract. In distributed sensor networks, the researches for authentication in sensor network have been focused on broadcast authentication. In this paper, we propose a message and its origin authentication protocol for data aggregation in sensor networks, based on one way hash chain and Merkle tree authentication with pre-deployment knowledge. Proposed protocol provides not only for downstream messages but also for upstream messages among neighbors, and it solves the secret value update issue with multiple Merkle trees and unbalanced energy consumption among sensor nodes with graceful handover of aggregator. In treating compromised node problem, our protocol provides an equivalent security level of pair-wise key sharing scheme, while much less memory requirements compared to pair-wise key sharing scheme

    Knowledge-Proof Based Versatile Smart Card Verification Protocol

    No full text
    We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler’s totient function and discrete logarithms over the ring Z=nZ, and can be applied to smart cards. A prover keeps a signed subgroup generator provided by a trusted center as its secret information. Our scheme has symmetricity in the sense that the same computational complexity and the same hardware both for Prover and for Verifier are required. Also, it requires minimal amount of computation and communications for secret information. The protocol is versatile enough to be applicable to digital signature scheme, multiple digital signature scheme and key exchange protocol. We outline those protocols to show the versatility of our protocol

    A Dual Key-Based Activation Scheme for Secure LoRaWAN

    No full text
    With the advent of the Internet of Things (IoT) era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN) technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa) is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN) is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption

    Novel congestion control scheme in next generation optical networks

    No full text
    In this paper, to improve the burst loss performance, we actively avoid contentions by proposing a novel congestion control scheme that operates based on the highest (called peak load) of the loads of all links over the path between each pair of ingress and egress nodes in an Optical Burst Switching (OBS) network. Document type: Part of book or chapter of boo
    corecore