Welcome: Xiamen ZoneWu Technology Co., LTD.
qui@zonewu.com 18146178586

Industry new

LoRaWAN What are the security aspects of the year

 Security is a major focus of any large-scale Iot deployment and is very important for any LPWAN.

LoRaWAN™ Use two layers of security: one layer for the network and the other layer for the application. Network security ensures the authenticity of nodes in the network, while the secure application layer ensures that network operators cannot access end-user application data.

Therefore, the LoRaWAN specification defines two layers of encryption:

A unique 128-bit network session key shared between the terminal device and the network server

 A unique 128-bit application session key (AppSKey) is shared end-to-end at the application level

 Data on the LoRaWAN is encrypted twice; sensor data is encrypted by the node and then again by the LoRaWAN protocol; only then it is sent to the LoRa gateway. The gateway sends the data to the network server via a normal IP network.

 The network server has a network session key (NwkSkey) and decrypts the LoRaWAN data. It then uses the application session key (AppSKey) to pass the data to the application server, which decrypts the sensor data.

 This is important because the LoRa gateway operates at an open frequency and thus can receive data from any nearby sensor. Therefore, it is important that the LoRa gateway does not have the ability to decrypt the sensor data.

 It is important to note that the LoRaWAN communication protocol adds encryption. LoRa transmission itself is simple radio wave transmission and cannot be encrypted.

LoRaWAN™ There are two ways for devices to join the network. First, the OTAA, with aerial activation. Device and network exchange for a 128-bit AppKey. When the device sends a join request, the AppKey is used to create the message integrity code (MIC), and the server then checks the MIC using the AppKey. If checked valid, the server creates two new 128-bit keys, the App Session key (AppSkey) and the network session key (NwkSkey). Use the AppKey as the encryption key to send these keys back to the device. When the key is received, the device decrypts and insttwo session keys.


CATEGORIES

CONTACT US

Contact: Qui

Phone: 18146178586

Tel: 18146178586

Email: qui@zonewu.com

Add: 1501-3, Building F03, Phase III, Software Park, Jimei District, Xiamen City, Fujian Province, China