CRITICAL REVIEW OF LORAWAN SECURITY ARCHITECTURES IN INDUSTRIAL IOT APPLICATIONS
Аннотация
This paper provides a critical review of LoRaWAN security architectures in Industrial IoT (IIoT) applications, analyzing its inherent mechanisms, vulnerabilities, and proposed enhancements. While LoRaWAN's features like AES-128 encryption and OTAA enable secure and efficient communication, challenges such as key reuse, denial-of-service attacks, and interference persist. Emerging solutions, including blockchain frameworks, FUOTA security measures, and machine learning-driven defenses, are explored to address these vulnerabilities. The study highlights the need for scalable, energy-efficient, and adaptive security approaches to ensure LoRaWAN’s continued effectiveness in evolving IIoT ecosystems.
Библиографические ссылки
K. Ashton, "That ‘Internet of Things’ Thing," RFID Journal, vol. 22, no. 7, 2009.
M. Wollschlaeger, T. Sauter, and J. Jasperneite, "The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things," IEEE Industrial Electronics Magazine, vol. 11, no. 1, pp. 17–27, 2017.
A. Augustin, J. Yi, T. Clausen, and W. M. Townsley, "A Study of LoRa: Long Range & Low Power Networks for the Internet of Things," Sensors, vol. 16, no. 9, pp. 1466–1476, 2016.
D. Bankov, E. Khorov, and A. Lyakhov, "On the Limits of LoRaWAN Channel Access Protocol," in Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2017, pp. 248–253.
R. Sanchez-Iborra and M. D. Cano, "State of the Art in LP-WAN Solutions for Industrial IoT Services," Sensors, vol. 16, no. 5, pp. 708–719, 2016.
H. Alshahrani, R. Simpson, and K. Morley, "Enhancing LoRaWAN Security: A Survey of Threats, Vulnerabilities, and Countermeasures," Journal of IoT Systems, vol. 8, no. 4, pp. 224–236, 2021.
J. R. Cotrim and C. B. Margi, "Make or Break? How LoRaWAN Duty Cycle Impacts Performance in Multihop Networks," IEEE Access, 2024.
S. Sindhukavi et al., "Investigation on Conventional LoRaWAN Communication System," IEEE ICCCNT, 2023.
A. Maleki et al., "A Tutorial on Chirp Spread Spectrum Modulation for LoRaWAN: Basics and Key Advances," IEEE Open Journal of the Communications Society, 2024.
A. Tepecik and A. F. Ağrak, "Analysis of Lorawan Protocol and Attacks Against Lorawan-Based IoT Devices," Int. J. of Applied Methods in Electronics and Computers, 2024.
M. Chen, J. Ben-Othman, and L. Mokdad, "Novel Denial-of-Service Attacks Against LoRaWAN on MAC Layer," IEEE Commun. Lett., 2023.
N. Hayati, "The Design of Security Framework for LoRaWAN FUOTA," J. Electrical Technology UMY, 2024.
J. Dave and N. Choudhury, "Security Enhancement of OTAA-based Joining Procedure in LoRaWAN for Satellite Communication," 2024.
P. Maurya et al., "A Comprehensive Survey of Data-Driven Solutions for LoRaWAN: Challenges & Future Directions," Preprint, 2024.