A Balancing Energy Efficiency and Security in CR-LoRaWAN Ecosystems
DOI:
https://doi.org/10.51519/journalisi.v6i4.886Keywords:
Cognitive Radio, LoRaWAN, Energy Efficiency, Key Security, Algo_A, Algo_B.Abstract
Cognitive Radio-enabled Long Range Wide Area Networks (CR-LoRaWAN) plays an important role in IoT applications. However, due to the limitations of devices and dynamic scheduling mechanisms of the channels, there is still a challenge to balance energy efficiency against security. This paper proposes two developed algorithms that address these challenges: Algo A and Algo B. Algo A ensures key security by mitigating nonce generation vulnerabilities through the replacement of insecure random numbers with prime numbers. Algo B develops this basis by further improving energy efficiency through optimization in session key generation and device management, adding security to it. Both the algorithms incorporate prime numbers in their session key generation that are verified by the Rabin-Miller test and the Sieve of Eratosthenes, with incorporated solar energy harvesting to give a longer life to such devices. Cognitive radio technology is integrated into it for dynamic and intelligent channel selection. Extensive simulations demonstrate that Algo A is much better at handling data with key security, while Algo B outperforms Algo A on energy consumption reduction by 20% and enhancement of overall network security by 15%. These results reveal that Algo B has a better trade-off between security and energy efficiency; hence, Algo B is more suitable for practical deployment. The work further enhances the sustainability and reliability of CR-LoRaWAN networks, especially in resource-constrained environments.
Downloads
References
J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," in Proc. Asia-Pac. Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA), 2016: IEEE, pp. 1-4.
J. Han and J. Wang, "An enhanced key management scheme for LoRaWAN," Cryptogr., vol. 2, no. 4, p. 34, 2018.
Z. Hu, Layered Network Protocols for Secure Communications in the Internet of Things, Univ. Oregon, Eugene, OR, USA, 2021.
J. Kim and J. Song, "A dual key-based activation scheme for secure LoRaWAN," Wireless Commun. Mobile Comput., vol. 2017, 2017.
Z. Mahmood, H. Ning, and A. Ghafoor, "A polynomial subset-based efficient multi-party key management system for lightweight device networks," Sensors, vol. 17, no. 4, p. 670, 2017.
S. Naoui, M. E. Elhdhili, and L. A. Saidane, "Trusted third party based key management for enhancing LoRaWAN security," in Proc. IEEE/ACS Int. Conf. Comput. Syst. Appl. (AICCSA), 2017: IEEE, pp. 1306-1313.
A. G. Roselin, P. Nanda, and S. Nepal, "Lightweight authentication protocol (LAUP) for 6LoWPAN wireless sensor networks," in Proc. IEEE Trustcom/BigDataSE/ICESS, 2017: IEEE, pp. 371-378.
K.-L. Tsai, Y.-L. Huang, F.-Y. Leu, and I. You, "TTP based high-efficient multi-key exchange protocol," IEEE Access, vol. 4, pp. 6261-6271, 2016.
K. Ntshabele, B. Isong, N. Gasela, and A. M. Abu-Mahfouz, "A trusted security key management server in LoRaWAN: Modelling and analysis," J. Sens. Actuator Netw., vol. 11, no. 3, p. 52, 2022.
A. J. Onumanyi, A. M. Abu-Mahfouz, and G. P. Hancke, "Low power wide area network, cognitive radio and the Internet of Things: Potentials for integration," Sensors, vol. 20, no. 23, p. 6837, 2020.
S. T. Ishmukhametov, B. G. Mubarakov, and R. G. Rubtsova, "On the number of witnesses in the Miller–Rabin primality test," Symmetry, vol. 12, no. 6, p. 890, 2020.
A. K. Tarafder and T. Chakroborty, "A comparative analysis of general, sieve-of-eratosthenes and rabin-miller approach for prime number generation," in Proc. Int. Conf. Electr. Comput. Commun. Eng. (ECCE), 2019: IEEE, pp. 1-4.
F. Salika, A. Nasser, M. Mroue, B. Parrein, and A. Mansour, "LoRaCog: A protocol for cognitive radio-based LoRa network," Sensors, vol. 22, no. 10, p. 3885, 2022.
K. Muteba, K. Djouani, and T. O. Olwal, "Deep reinforcement learning based resource allocation for narrowband cognitive radio-IoT systems," Procedia Comput. Sci., vol. 175, pp. 315-324, 2020.
M. Mroue, A. Nasser, B. Parrein, A. Mansour, C. Zaki, and E. M. Cruz, "ESco: Eligibility score-based strategy for sensors selection in CR-IoT: Application to LoRaWAN," Internet Things, vol. 13, p. 100362, 2021.
O. O. Umeonwuka, B. S. Adejumobi, and T. Shongwe, "Deep learning algorithms for RF energy harvesting cognitive IoT devices: Applications, challenges and opportunities," in Proc. Int. Conf. Electr. Comput. Energy Technol. (ICECET), 2022: IEEE, pp. 1-6.
N. Zhang, H. Liang, N. Cheng, Y. Tang, J. W. Mark, and X. S. Shen, "Dynamic spectrum access in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2053-2064, 2014.
K.-L. Tsai, Y.-L. Huang, F.-Y. Leu, I. You, Y.-L. Huang, and C.-H. Tsai, "AES-128 based secure low power communication for LoRaWAN IoT environments," IEEE Access, vol. 6, pp. 45325-45334, 2018.
H. Ruotsalainen, J. Zhang, and S. Grebeniuk, "Experimental investigation on wireless key generation for low-power wide-area networks," IEEE Internet Things J., vol. 7, no. 3, pp. 1745-1755, 2019.
S.-Y. Gao, X.-H. Li, and M.-D. Ma, "A malicious behaviour awareness and defense countermeasure based on LoRaWAN protocol," Sensors, vol. 19, no. 23, p. 5122, 2019.
A. Gorcin, K. A. Qaraqe, H. Celebi, and H. Arslan, "An adaptive threshold method for spectrum sensing in multi-channel cognitive radio networks," in Proc. Int. Conf. Telecommun., 2010: IEEE, pp. 425-429.
N. Zhang, H. Liang, N. Cheng, Y. Tang, J. W. Mark, and X. S. Shen, "Dynamic spectrum access in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2053-2064, 2014.
T. C. Dönmez and E. Nigussie, "Security of LoRaWAN v1.1 in backward compatibility scenarios," Procedia Comput. Sci., vol. 134, pp. 51-58, 2018.
E. Sisinni and A. Mahmood, "Wireless communications for industrial Internet of Things: The LPWAN solutions," in Wireless Netw. Ind. IoT: Appl., Challenges Enablers, pp. 79-103, 2021.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














