Potential Development of AES 128-bit Key Generation for LoRaWAN Security

Nur Hayati, Kalamullah Ramli, Muhammad Suryanegara, Yohan Suryanto

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Citations (Scopus)

Abstract

This research aims to simulate and analyze a potential parameter of developing the key generation used for encryption in LoRaWAN. Key generation or key scheduling is an important part of the encryption process because in modern security, encryption algorithm will be shared widely so that it can be developed according to standards, and its strength tested, but the cipher key will remain hidden. In the LoRaWANnetwork, key generation is part of Advanced Encryption Standard (AES) encryption embedded in the NwkSKey and the AppSKey. Our research provides baseline information that has the potential to develop the key-generation algorithm used in LoRaWAN. We conduct simulations for gathering field data and then discuss three parameters related to the technical development of key generation: processing time, randomness level and key length. Meanwhile for LoRaWAN, there are two additional parameters that need to be considered: computation resources and battery durability.

Original languageEnglish
Title of host publication2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages57-61
Number of pages5
ISBN (Electronic)9781728114392
DOIs
Publication statusPublished - 1 Apr 2019
Event2nd International Conference on Communication Engineering and Technology, ICCET 2019 - Nagoya, Japan
Duration: 12 Apr 201915 Apr 2019

Publication series

Name2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019

Conference

Conference2nd International Conference on Communication Engineering and Technology, ICCET 2019
Country/TerritoryJapan
CityNagoya
Period12/04/1915/04/19

Keywords

  • AES
  • IoT security
  • key generation
  • LoRaWAN
  • symmetric encryption

Fingerprint

Dive into the research topics of 'Potential Development of AES 128-bit Key Generation for LoRaWAN Security'. Together they form a unique fingerprint.

Cite this