Experimental results of using AES-128 in LoRaWAN
Annotation
In the Internet of Things (IoT), Low Power Wide Area Networks (LPWAN) technologies have been obtaining considerable attention. Long-Range Wide-Area Networks (LoRaWAN) was created by the Long Range (LoRa) Alliance as an open standard operating over the unlicensed band. Its advantages include a large coverage area, low power consumption, and inexpensive transceiver chips. The standard of LoRaWAN encryption uses a 128-bit symmetric algorithm called Advanced Encryption Standard (AES). This standard secures communication and entities which are beneficial for resource-constrained devices on the IoT for efficient communication and security. The security problems with LoRa networks and devices remain an important challenge considering the technology large deployment for numerous applications. Even though LoRaWAN network architecture and security have been enhanced by the LoRa Alliance, the most recent version still has some weaknesses such as its susceptibility to attacks. Many studies and researchers have indicated that LoRaWAN versions 1.0 and 1.1 have security risks and vulnerabilities. This research proposes a method to construct and integrate cryptographic algorithms (AES-128) within widely utilized wireless Network Server Simulators NS-3. This module aims to increase the security of data in LoRa networks by protecting critical information from unauthorized access. Consequently, implementing the AES-128 encryption algorithm within the NS-3 simulator will benefit the scientific community greatly. This will enable an examination of the impact of various security measures on network performance metrics, including latency, overhead, energy consumption, throughput, and packet size.
Keywords
Постоянный URL
Articles in current issue
- Application of machine vision for automatic control of the process of growing monocrystals of thallium halides using the Bridgman-Stockbarger method
- Optical spin currents in chiral optical fibers
- Geometric modeling and compensation of cutting tool positioning errors for eliminating protrusion in large-radius spherical surface machining
- Control of composition and determination of dosage of hydrate formation inhibitors by their infrared spectra
- Classification of human motor activity based on multisensory data analysis
A universal architecture model of a crowdsourcing medical data labeling system designed
Методы оптимизации роя частиц и локальная эвристика для решения задачи о нескольких коммивояжерах
- Accelerating and analyzing performance of shortest path algorithms on GPU using CUDA platform: Bellman-Ford, Dijkstra, and Floyd-Warshall algorithms
Anomaly detection for IIoT: analyzing Edge-IIoTset dataset with varied class distributions
- Incorporating negative examples into Hidden Markov Model-based classification of peptide sequences
- Vector embeddings compression using clustering with the ensemble of oblivious decision trees and separate centroids storage
Enhanced detection of denial-of-service attacks in Kubernetes: a multi-framework machine learning approach integrating node and application metrics
Solving the problem of autonomous drone navigation based on the integration of inertial and optical measurement systems
- Mathematical model of the motion of a spherical rotor during finishing with cup laps and free abrasive
Experimental study of the optically transparent gas flow and temperature field using the background oriented Schlieren method
- Development and research of a reinforcement learning method for acoustic diagnostics of industrial equipment
Methods of modeling anomalous modes of dynamic processes based on energy estimation
Wave regression: nonlinear cognitive heuristic
- Assessment of the reliability of a recoverable container virtualization cluster
- Calculation of the volume of simplex in barycentric coordinates in a multidimensional Euclidean space
Probabilistic matrix clustering with feature priors for unbiased control selection