物联网学报 ›› 2021, Vol. 5 ›› Issue (4): 17-25.doi: 10.11959/j.issn.2096-3750.2021.00228

• 理论与技术 • 上一篇    下一篇

基于射频指纹的LoRa网络安全方案研究

姜禹1,2, 陈思卿1, 孙雯1   

  1. 1 东南大学网络空间安全学院,江苏 南京 211189
    2 网络通信与安全紫金山实验室,江苏 南京 211111
  • 修回日期:2021-11-06 出版日期:2021-12-30 发布日期:2021-12-01
  • 作者简介:姜禹(1981− ),男,博士,东南大学网络空间安全学院副教授,主要研究方向为物理层安全、无线网络安全、RFID技术、物联网技术等
    陈思卿(1996− ),男,东南大学网络空间安全学院硕士生,主要研究方向为物理层安全、无线网络安全、RFID技术、物联网技术等
    孙雯(1988− ),女,博士,东南大学网络空间安全学院讲师,主要研究方向为物理层安全、无线网络安全、人工智能、物联网技术等
  • 基金资助:
    江苏省重点研发计划(BE2019109);国家自然科学基金资助项目(61571110);国家自然科学基金资助项目(61601114);国家自然科学基金资助项目(61602113);国家自然科学基金资助项目(61801115);江苏省自然科学基金资助项目(BK20160692)

Research on LoRa network security schemes based on RF fingerprint

Yu JIANG1,2, Siqing CHEN1, Wen SUN1   

  1. 1 School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
    2 Purple Mountain Laboratories, Nanjing 211111, China
  • Revised:2021-11-06 Online:2021-12-30 Published:2021-12-01
  • Supported by:
    The Key Research and Development Program of Jiangsu Province(BE2019109);The National Natural Science Foundation of China(61571110);The National Natural Science Foundation of China(61601114);The National Natural Science Foundation of China(61602113);The National Natural Science Foundation of China(61801115);The Natural Science Foundation of Jiangsu Province(BK20160692)

摘要:

远距离无线电(LoRa, long range radio)凭其远距离、低功耗的优点在物联网中应用广泛,但目前LoRa网络还没有可靠的安全方案,无法保证通信安全。为此,基于射频指纹的唯一性和难以篡改性,提出接收请求接入的LoRa终端的射频信号,提取指纹并标注,与根据需求自定义的多尺度安全规则匹配来判断终端身份是否安全,采取对应安全措施。据此,对原有 LoRa 网关及 LoRa 网络架构进行改进,设计了全新的工作流程,提出了两种LoRa网络安全方案。提出的LoRa网络安全方案从物理层实现LoRa终端身份认证和接入控制,仅需针对原有网关及其工作逻辑进行改进,无须改造数量巨大的LoRa终端,在不影响原有LoRaWAN安全机制工作的基础上,给LoRa物联网应用添加新的安全措施和保障,具有很高的实用价值。

关键词: 射频指纹, 物理层安全, 接入控制, LoRa网关, LoRa网络安全

Abstract:

Long range radio (LoRa) is widely used in the IoT due to its advantages of long distance and low power consumption.However, LoRa network has no reliable security scheme currently, making it unable to guarantee the communication security.Therefore, based on the uniqueness and tamper-resistance of radio frequency fingerprint, it was proposed to receive radio frequency signals of the LoRa end nodes which requested access, extract the fingerprints from them, mark it and match with the customized multi-scale security rules according to demands to decide whether the identities of the LoRa end nodes were safe, taking security measures accordingly.Based on this, original LoRa gateway and LoRa network architecture were improved, new workflows were designed, and two LoRa network security schemes were proposed.The two LoRa network security schemes were proposed which implement identity authentication and access control of the LoRa end nodes from the physical layer.It is only needed to improve the original LoRa gateway in the LoRa network architecture and its workflow, which adds new security measures and guarantees for LoRa applications on the basis of not affecting the original LoRaWAN security mechanism, with no need to modify a huge number of LoRa end nodes.The security schemes proposed have high practical value.

Key words: RF fingerprint, physical layer security, access control, LoRa gateway, LoRa network security

中图分类号: 

No Suggested Reading articles found!