TY - GEN
T1 - Potential Development of AES 128-bit Key Generation for LoRaWAN Security
AU - Hayati, Nur
AU - Ramli, Kalamullah
AU - Suryanegara, Muhammad
AU - Suryanto, Yohan
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/4/1
Y1 - 2019/4/1
N2 - This research aims to simulate and analyze a potential parameter of developing the key generation used for encryption in LoRaWAN. Key generation or key scheduling is an important part of the encryption process because in modern security, encryption algorithm will be shared widely so that it can be developed according to standards, and its strength tested, but the cipher key will remain hidden. In the LoRaWANnetwork, key generation is part of Advanced Encryption Standard (AES) encryption embedded in the NwkSKey and the AppSKey. Our research provides baseline information that has the potential to develop the key-generation algorithm used in LoRaWAN. We conduct simulations for gathering field data and then discuss three parameters related to the technical development of key generation: processing time, randomness level and key length. Meanwhile for LoRaWAN, there are two additional parameters that need to be considered: computation resources and battery durability.
AB - This research aims to simulate and analyze a potential parameter of developing the key generation used for encryption in LoRaWAN. Key generation or key scheduling is an important part of the encryption process because in modern security, encryption algorithm will be shared widely so that it can be developed according to standards, and its strength tested, but the cipher key will remain hidden. In the LoRaWANnetwork, key generation is part of Advanced Encryption Standard (AES) encryption embedded in the NwkSKey and the AppSKey. Our research provides baseline information that has the potential to develop the key-generation algorithm used in LoRaWAN. We conduct simulations for gathering field data and then discuss three parameters related to the technical development of key generation: processing time, randomness level and key length. Meanwhile for LoRaWAN, there are two additional parameters that need to be considered: computation resources and battery durability.
KW - AES
KW - IoT security
KW - key generation
KW - LoRaWAN
KW - symmetric encryption
UR - http://www.scopus.com/inward/record.url?scp=85067944636&partnerID=8YFLogxK
U2 - 10.1109/ICCET.2019.8726884
DO - 10.1109/ICCET.2019.8726884
M3 - Conference contribution
AN - SCOPUS:85067944636
T3 - 2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019
SP - 57
EP - 61
BT - 2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd International Conference on Communication Engineering and Technology, ICCET 2019
Y2 - 12 April 2019 through 15 April 2019
ER -