A Balancing Energy Efficiency and Security in CR-LoRaWAN Ecosystems

  • Koketso Ntshabele North West University, South Africa
  • Bassey Isong North-West University, South Africa
Keywords: Cognitive Radio, LoRaWAN, Energy Efficiency, Key Security, Algo_A, Algo_B.

Abstract

Cognitive Radio-enabled Long Range Wide Area Networks (CR-LoRaWAN) plays an important role in IoT applications. However, due to the limitations of devices and dynamic scheduling mechanisms of the channels, there is still a challenge to balance energy efficiency against security. This paper proposes two developed algorithms that address these challenges: Algo A and Algo B. Algo A ensures key security by mitigating nonce generation vulnerabilities through the replacement of insecure random numbers with prime numbers. Algo B develops this basis by further improving energy efficiency through optimization in session key generation and device management, adding security to it. Both the algorithms incorporate prime numbers in their session key generation that are verified by the Rabin-Miller test and the Sieve of Eratosthenes, with incorporated solar energy harvesting to give a longer life to such devices. Cognitive radio technology is integrated into it for dynamic and intelligent channel selection. Extensive simulations demonstrate that Algo A is much better at handling data with key security, while Algo B outperforms Algo A on energy consumption reduction by 20% and enhancement of overall network security by 15%. These results reveal that Algo B has a better trade-off between security and energy efficiency; hence, Algo B is more suitable for practical deployment. The work further enhances the sustainability and reliability of CR-LoRaWAN networks, especially in resource-constrained environments.

Downloads

Download data is not yet available.

References

J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," in Proc. Asia-Pac. Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA), 2016: IEEE, pp. 1-4.

J. Han and J. Wang, "An enhanced key management scheme for LoRaWAN," Cryptogr., vol. 2, no. 4, p. 34, 2018.

Z. Hu, Layered Network Protocols for Secure Communications in the Internet of Things, Univ. Oregon, Eugene, OR, USA, 2021.

J. Kim and J. Song, "A dual key-based activation scheme for secure LoRaWAN," Wireless Commun. Mobile Comput., vol. 2017, 2017.

Z. Mahmood, H. Ning, and A. Ghafoor, "A polynomial subset-based efficient multi-party key management system for lightweight device networks," Sensors, vol. 17, no. 4, p. 670, 2017.

S. Naoui, M. E. Elhdhili, and L. A. Saidane, "Trusted third party based key management for enhancing LoRaWAN security," in Proc. IEEE/ACS Int. Conf. Comput. Syst. Appl. (AICCSA), 2017: IEEE, pp. 1306-1313.

A. G. Roselin, P. Nanda, and S. Nepal, "Lightweight authentication protocol (LAUP) for 6LoWPAN wireless sensor networks," in Proc. IEEE Trustcom/BigDataSE/ICESS, 2017: IEEE, pp. 371-378.

K.-L. Tsai, Y.-L. Huang, F.-Y. Leu, and I. You, "TTP based high-efficient multi-key exchange protocol," IEEE Access, vol. 4, pp. 6261-6271, 2016.

K. Ntshabele, B. Isong, N. Gasela, and A. M. Abu-Mahfouz, "A trusted security key management server in LoRaWAN: Modelling and analysis," J. Sens. Actuator Netw., vol. 11, no. 3, p. 52, 2022.

A. J. Onumanyi, A. M. Abu-Mahfouz, and G. P. Hancke, "Low power wide area network, cognitive radio and the Internet of Things: Potentials for integration," Sensors, vol. 20, no. 23, p. 6837, 2020.

S. T. Ishmukhametov, B. G. Mubarakov, and R. G. Rubtsova, "On the number of witnesses in the Miller–Rabin primality test," Symmetry, vol. 12, no. 6, p. 890, 2020.

A. K. Tarafder and T. Chakroborty, "A comparative analysis of general, sieve-of-eratosthenes and rabin-miller approach for prime number generation," in Proc. Int. Conf. Electr. Comput. Commun. Eng. (ECCE), 2019: IEEE, pp. 1-4.

F. Salika, A. Nasser, M. Mroue, B. Parrein, and A. Mansour, "LoRaCog: A protocol for cognitive radio-based LoRa network," Sensors, vol. 22, no. 10, p. 3885, 2022.

K. Muteba, K. Djouani, and T. O. Olwal, "Deep reinforcement learning based resource allocation for narrowband cognitive radio-IoT systems," Procedia Comput. Sci., vol. 175, pp. 315-324, 2020.

M. Mroue, A. Nasser, B. Parrein, A. Mansour, C. Zaki, and E. M. Cruz, "ESco: Eligibility score-based strategy for sensors selection in CR-IoT: Application to LoRaWAN," Internet Things, vol. 13, p. 100362, 2021.

O. O. Umeonwuka, B. S. Adejumobi, and T. Shongwe, "Deep learning algorithms for RF energy harvesting cognitive IoT devices: Applications, challenges and opportunities," in Proc. Int. Conf. Electr. Comput. Energy Technol. (ICECET), 2022: IEEE, pp. 1-6.

N. Zhang, H. Liang, N. Cheng, Y. Tang, J. W. Mark, and X. S. Shen, "Dynamic spectrum access in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2053-2064, 2014.

K.-L. Tsai, Y.-L. Huang, F.-Y. Leu, I. You, Y.-L. Huang, and C.-H. Tsai, "AES-128 based secure low power communication for LoRaWAN IoT environments," IEEE Access, vol. 6, pp. 45325-45334, 2018.

H. Ruotsalainen, J. Zhang, and S. Grebeniuk, "Experimental investigation on wireless key generation for low-power wide-area networks," IEEE Internet Things J., vol. 7, no. 3, pp. 1745-1755, 2019.

S.-Y. Gao, X.-H. Li, and M.-D. Ma, "A malicious behaviour awareness and defense countermeasure based on LoRaWAN protocol," Sensors, vol. 19, no. 23, p. 5122, 2019.

A. Gorcin, K. A. Qaraqe, H. Celebi, and H. Arslan, "An adaptive threshold method for spectrum sensing in multi-channel cognitive radio networks," in Proc. Int. Conf. Telecommun., 2010: IEEE, pp. 425-429.

N. Zhang, H. Liang, N. Cheng, Y. Tang, J. W. Mark, and X. S. Shen, "Dynamic spectrum access in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2053-2064, 2014.

T. C. Dönmez and E. Nigussie, "Security of LoRaWAN v1.1 in backward compatibility scenarios," Procedia Comput. Sci., vol. 134, pp. 51-58, 2018.

E. Sisinni and A. Mahmood, "Wireless communications for industrial Internet of Things: The LPWAN solutions," in Wireless Netw. Ind. IoT: Appl., Challenges Enablers, pp. 79-103, 2021.

Published
2024-12-15
Abstract views: 181 times
Download PDF: 108 times
How to Cite
Ntshabele, K., & Isong, B. (2024). A Balancing Energy Efficiency and Security in CR-LoRaWAN Ecosystems. Journal of Information Systems and Informatics, 6(4), 2447-2474. https://doi.org/10.51519/journalisi.v6i4.886
Section
Articles