A Balancing Energy Efficiency and Security in CR-LoRaWAN Ecosystems
Abstract
Cognitive Radio-enabled Long Range Wide Area Networks (CR-LoRaWAN) plays an important role in IoT applications. However, due to the limitations of devices and dynamic scheduling mechanisms of the channels, there is still a challenge to balance energy efficiency against security. This paper proposes two developed algorithms that address these challenges: Algo A and Algo B. Algo A ensures key security by mitigating nonce generation vulnerabilities through the replacement of insecure random numbers with prime numbers. Algo B develops this basis by further improving energy efficiency through optimization in session key generation and device management, adding security to it. Both the algorithms incorporate prime numbers in their session key generation that are verified by the Rabin-Miller test and the Sieve of Eratosthenes, with incorporated solar energy harvesting to give a longer life to such devices. Cognitive radio technology is integrated into it for dynamic and intelligent channel selection. Extensive simulations demonstrate that Algo A is much better at handling data with key security, while Algo B outperforms Algo A on energy consumption reduction by 20% and enhancement of overall network security by 15%. These results reveal that Algo B has a better trade-off between security and energy efficiency; hence, Algo B is more suitable for practical deployment. The work further enhances the sustainability and reliability of CR-LoRaWAN networks, especially in resource-constrained environments.
Downloads
References
J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," in Proc. Asia-Pac. Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA), 2016: IEEE, pp. 1-4.
J. Han and J. Wang, "An enhanced key management scheme for LoRaWAN," Cryptogr., vol. 2, no. 4, p. 34, 2018.
Z. Hu, Layered Network Protocols for Secure Communications in the Internet of Things, Univ. Oregon, Eugene, OR, USA, 2021.
J. Kim and J. Song, "A dual key-based activation scheme for secure LoRaWAN," Wireless Commun. Mobile Comput., vol. 2017, 2017.
Z. Mahmood, H. Ning, and A. Ghafoor, "A polynomial subset-based efficient multi-party key management system for lightweight device networks," Sensors, vol. 17, no. 4, p. 670, 2017.
S. Naoui, M. E. Elhdhili, and L. A. Saidane, "Trusted third party based key management for enhancing LoRaWAN security," in Proc. IEEE/ACS Int. Conf. Comput. Syst. Appl. (AICCSA), 2017: IEEE, pp. 1306-1313.
A. G. Roselin, P. Nanda, and S. Nepal, "Lightweight authentication protocol (LAUP) for 6LoWPAN wireless sensor networks," in Proc. IEEE Trustcom/BigDataSE/ICESS, 2017: IEEE, pp. 371-378.
K.-L. Tsai, Y.-L. Huang, F.-Y. Leu, and I. You, "TTP based high-efficient multi-key exchange protocol," IEEE Access, vol. 4, pp. 6261-6271, 2016.
K. Ntshabele, B. Isong, N. Gasela, and A. M. Abu-Mahfouz, "A trusted security key management server in LoRaWAN: Modelling and analysis," J. Sens. Actuator Netw., vol. 11, no. 3, p. 52, 2022.
A. J. Onumanyi, A. M. Abu-Mahfouz, and G. P. Hancke, "Low power wide area network, cognitive radio and the Internet of Things: Potentials for integration," Sensors, vol. 20, no. 23, p. 6837, 2020.
S. T. Ishmukhametov, B. G. Mubarakov, and R. G. Rubtsova, "On the number of witnesses in the Miller–Rabin primality test," Symmetry, vol. 12, no. 6, p. 890, 2020.
A. K. Tarafder and T. Chakroborty, "A comparative analysis of general, sieve-of-eratosthenes and rabin-miller approach for prime number generation," in Proc. Int. Conf. Electr. Comput. Commun. Eng. (ECCE), 2019: IEEE, pp. 1-4.
F. Salika, A. Nasser, M. Mroue, B. Parrein, and A. Mansour, "LoRaCog: A protocol for cognitive radio-based LoRa network," Sensors, vol. 22, no. 10, p. 3885, 2022.
K. Muteba, K. Djouani, and T. O. Olwal, "Deep reinforcement learning based resource allocation for narrowband cognitive radio-IoT systems," Procedia Comput. Sci., vol. 175, pp. 315-324, 2020.
M. Mroue, A. Nasser, B. Parrein, A. Mansour, C. Zaki, and E. M. Cruz, "ESco: Eligibility score-based strategy for sensors selection in CR-IoT: Application to LoRaWAN," Internet Things, vol. 13, p. 100362, 2021.
O. O. Umeonwuka, B. S. Adejumobi, and T. Shongwe, "Deep learning algorithms for RF energy harvesting cognitive IoT devices: Applications, challenges and opportunities," in Proc. Int. Conf. Electr. Comput. Energy Technol. (ICECET), 2022: IEEE, pp. 1-6.
N. Zhang, H. Liang, N. Cheng, Y. Tang, J. W. Mark, and X. S. Shen, "Dynamic spectrum access in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2053-2064, 2014.
K.-L. Tsai, Y.-L. Huang, F.-Y. Leu, I. You, Y.-L. Huang, and C.-H. Tsai, "AES-128 based secure low power communication for LoRaWAN IoT environments," IEEE Access, vol. 6, pp. 45325-45334, 2018.
H. Ruotsalainen, J. Zhang, and S. Grebeniuk, "Experimental investigation on wireless key generation for low-power wide-area networks," IEEE Internet Things J., vol. 7, no. 3, pp. 1745-1755, 2019.
S.-Y. Gao, X.-H. Li, and M.-D. Ma, "A malicious behaviour awareness and defense countermeasure based on LoRaWAN protocol," Sensors, vol. 19, no. 23, p. 5122, 2019.
A. Gorcin, K. A. Qaraqe, H. Celebi, and H. Arslan, "An adaptive threshold method for spectrum sensing in multi-channel cognitive radio networks," in Proc. Int. Conf. Telecommun., 2010: IEEE, pp. 425-429.
N. Zhang, H. Liang, N. Cheng, Y. Tang, J. W. Mark, and X. S. Shen, "Dynamic spectrum access in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2053-2064, 2014.
T. C. Dönmez and E. Nigussie, "Security of LoRaWAN v1.1 in backward compatibility scenarios," Procedia Comput. Sci., vol. 134, pp. 51-58, 2018.
E. Sisinni and A. Mahmood, "Wireless communications for industrial Internet of Things: The LPWAN solutions," in Wireless Netw. Ind. IoT: Appl., Challenges Enablers, pp. 79-103, 2021.


Copyright (c) 2024 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)