Chinese Journal on Internet of Things ›› 2021, Vol. 5 ›› Issue (4): 17-25.doi: 10.11959/j.issn.2096-3750.2021.00228

• Theory and Technology • Previous Articles     Next Articles

Research on LoRa network security schemes based on RF fingerprint

Yu JIANG1,2, Siqing CHEN1, Wen SUN1   

  1. 1 School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
    2 Purple Mountain Laboratories, Nanjing 211111, China
  • Revised:2021-11-06 Online:2021-12-30 Published:2021-12-01
  • Supported by:
    The Key Research and Development Program of Jiangsu Province(BE2019109);The National Natural Science Foundation of China(61571110);The National Natural Science Foundation of China(61601114);The National Natural Science Foundation of China(61602113);The National Natural Science Foundation of China(61801115);The Natural Science Foundation of Jiangsu Province(BK20160692)

Abstract:

Long range radio (LoRa) is widely used in the IoT due to its advantages of long distance and low power consumption.However, LoRa network has no reliable security scheme currently, making it unable to guarantee the communication security.Therefore, based on the uniqueness and tamper-resistance of radio frequency fingerprint, it was proposed to receive radio frequency signals of the LoRa end nodes which requested access, extract the fingerprints from them, mark it and match with the customized multi-scale security rules according to demands to decide whether the identities of the LoRa end nodes were safe, taking security measures accordingly.Based on this, original LoRa gateway and LoRa network architecture were improved, new workflows were designed, and two LoRa network security schemes were proposed.The two LoRa network security schemes were proposed which implement identity authentication and access control of the LoRa end nodes from the physical layer.It is only needed to improve the original LoRa gateway in the LoRa network architecture and its workflow, which adds new security measures and guarantees for LoRa applications on the basis of not affecting the original LoRaWAN security mechanism, with no need to modify a huge number of LoRa end nodes.The security schemes proposed have high practical value.

Key words: RF fingerprint, physical layer security, access control, LoRa gateway, LoRa network security

CLC Number: 

No Suggested Reading articles found!