Preview

Scientific and Technical Journal of Information Technologies, Mechanics and Optics

Advanced search

Experimental results of using AES-128 in LoRaWAN

https://doi.org/10.17586/2226-1494-2025-25-5-923-932

Abstract

In the Internet of Things (IoT), Low Power Wide Area Networks (LPWAN) technologies have been obtaining considerable attention. Long-Range Wide-Area Networks (LoRaWAN) was created by the Long Range (LoRa) Alliance as an open standard operating over the unlicensed band. Its advantages include a large coverage area, low power consumption, and inexpensive transceiver chips. The standard of LoRaWAN encryption uses a 128-bit symmetric algorithm called Advanced Encryption Standard (AES). This standard secures communication and entities which are beneficial for resource-constrained devices on the IoT for efficient communication and security. The security problems with LoRa networks and devices remain an important challenge considering the technology large deployment for numerous applications. Even though LoRaWAN network architecture and security have been enhanced by the LoRa Alliance, the most recent version still has some weaknesses such as its susceptibility to attacks. Many studies and researchers have indicated that LoRaWAN versions 1.0 and 1.1 have security risks and vulnerabilities. This research proposes a method to construct and integrate cryptographic algorithms (AES-128) within widely utilized wireless Network Server Simulators NS-3. This module aims to increase the security of data in LoRa networks by protecting critical information from unauthorized access. Consequently, implementing the AES-128 encryption algorithm within the NS-3 simulator will benefit the scientific community greatly. This will enable an examination of the impact of various security measures on network performance metrics, including latency, overhead, energy consumption, throughput, and packet size.

About the Authors

A. Nouar
Hassiba Ben Bouali University (UHBC), LMA Laboratory
Algeria

Abdelouahab Nouar — PhD Student

sc 58865584200

Chlef, 02010



M. Tahar Abbes
Hassiba Ben Bouali University (UHBC)
Algeria

Mounir Tahar Abbes — Professor

sc 57212811077

Chlef, 02010



S. Boumerdassi
Conservatoire National des Arts et Metiers (CNAM)
France

Selma Boumerdassi — Professor

sc 6602291128

Paris, 75141



M. Chaib
Hassiba Ben Bouali University (UHBC), LMA Laboratory
Algeria

Mostefa Chaib — PhD, Researcher

sc 58835296600

Chlef, 02010

 



References

1. Mostefa C., Mounir T.A., Abdelmadjid A.M., Nouar A. Ft-CSMA: A fine-tuned CSMA protocol for LoRa-based networks. Journal of Communications, 2024, vol. 19, no. 2, pp. 65–77. https://doi.org/10.12720/jcm.19.2.65-77

2. Umbreen S., Shehzad D., Shafi N., Khan B., Habib U. An energyefficient mobility-based cluster head selection for lifetime enhancement of wireless sensor networks. IEEE Access, 2020, vol. 8, pp. 207779–207793. https://doi.org/10.1109/access.2020.3038031

3. Mostefa C., Abdelouahab N., Mounir T.A., Boumerdassi S., Femmam S., Amel Z.A. Formal validation of ADR protocol in LoRaWAN network using Event-b. Proc. of the 7th International Conference on Computer, Software and Modeling (ICCSM), 2023, pp. 11–15. https://doi.org/10.1109/ICCSM60247.2023.00011

4. Sornin N., Luis M., Eirich T., Kramp T., Hersent O. LoRaWAN Specification. V. 1. LoRa Alliance Inc., 2015, 82 p.

5. LoRaWAN® L2 1.0.4 Specification (TS001-1.0.4). Lora Alliance Technical Committee, 2020, 90 p.

6. Butun I., Pereira N., Gidlund M. Analysis of LoRaWAN v1.1 security: research paper. Proc. of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, 2018, pp. 1–6. https://doi.org/10.1145/3213299.3213304

7. Andreas W., de la Fuente A.G., Christoph L., Michael K. Physical layer security based key management for LoRaWAN. arXiv, 2021, arXiv:2101.02975. https://doi.org/10.48550/arXiv.2101.02975

8. El Fehri C., Baccour N., Berthou P., Kammoun I. Experimental analysis of the over-the-air activation procedure in LoRaWAN. Proc. of the 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2021, pp. 30–35. https://doi.org/10.1109/wimob52687.2021.9606301

9. Tsai K.-L., Leu F.-Y., Hung L.-L., Ko C.-Y. Secure session key generation method for LoRaWAN servers. IEEE Access, 2020, vol. 8, pp. 54631–54640. https://doi.org/10.1109/ACCESS.2020.2978100

10. Hessel F., Almon L., Alvarez F. ChirpOTLE: a framework for practical LoRaWAN security evaluation. Proc. of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, pp. 306–316. https://doi.org/10.1145/3395351.3399423

11. Pospisil O., Fujdiak R., Mikhaylov K., Ruotsalainen H., Misurec J. Testbed for LoRaWAN security: design and validation through manin-the-middle attacks study. Applied Sciences, 2021, vol. 11, no. 16, pp. 7642. https://doi.org/10.3390/app11167642

12. Tsai K.-L., Leu F.-Y., You I., Chang S.-W., Hu S.-J., Park H. Lowpower AES data encryption architecture for a LoRaWAN. IEEE Access, 2019, vol. 7, pp. 146348–146357. https://doi.org/10.1109/access.2019.2941972

13. Thaenkaew P., Quoitin B., Meddahi A. Evaluating the cost of beyond AES-128 LoRaWAN security. Proc. of the International Symposium on Networks, Computers and Communications (ISNCC), 2022, pp. 1–6. https://doi.org/10.1109/isncc55209.2022.9851811

14. Naoui S., Elhdhili M.E., Saidane L.A. Trusted third party based key management for enhancing LoRaWAN security. Proc. of the IEEE/ ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017, pp. 1306–1313. https://doi.org/10.1109/AICCSA.2017.73

15. Jalowiczor J., Rozhon J., Voznak M. Study of the efficiency of fog computing in an optimized LoRaWAN cloud architecture. Sensors, 2021, vol. 21, no. 9, pp. 3159. https://doi.org/10.3390/s21093159

16. Qadir J., Butun I., Gastaldo P., Aiello O., Caviglia D.D. Mitigating cyber attacks in LoRaWAN via lightweight secure key management scheme. IEEE Access, 2023, vol. 11, pp. 68301–68315. https://doi.org/10.1109/ACCESS.2023.3291420

17. Hanna Y., Cebe M., Leon J., Akkaya K. Efficient group key management for resilient operation of LoRaWAN-based smart grid applications. IEEE Transactions on Control Systems Technology, 2024, vol. 32, no. 5, pp. 1706–1717. https://doi.org/10.1109/tcst.2024.3378988

18. Han B., Li Y., Wang X., Li H., Huang J. FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN. Future Generation Computer Systems, 2023, vol. 140, pp. 253–265. https://doi.org/10.1016/j.future.2022.10.018

19. Islam M., Jamil H.M.M., Pranto S.A., Das R.K., Amin A., Khan A. Future industrial applications: exploring LPWAN-driven IoT protocols. Sensors, 2024, vol. 24, no. 8, pp. 2509. https://doi.org/10.3390/s24082509

20. Na S., Hwang D., Shin W., Kim K.-H. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. Proc. of the International Conference on Information Networking (ICOIN), 2017, pp. 718–720. https://doi.org/10.1109/ICOIN.2017.7899580

21. Kang J.-M., Lim D.-W. On the quasi-orthogonality of LoRa modulation. IEEE Internet of Things Journal, 2023, vol. 10, no. 14, pp. 12366–12378. https://doi.org/10.1109/jiot.2023.3245885

22. Tsai K.-L., Huang Y.-L., Leu F.-Y., You I., Huang Y.-L., Tsai C.-H. AES-128 based secure low power communication for LoRaWAN IoT environment. IEEE Access, 2018, vol. 6, pp. 45325–45334. https://doi.org/10.1109/access.2018.2852563

23. Abboud S., Abdoun N. Enhancing LoRaWAN security: an advanced AES-based cryptographic approach. IEEE Access, 2024, vol. 12, P. 2589–2606. https://doi.org/10.1109/ACCESS.2023.3348416

24. Nouar A., Abbes M.T., Boumerdassi S., Chaib M. Impact of mobility model on LoRaWAN performance. Journal of Communications, 2024, vol. 19, no. 1. pp. 7–18. https://doi.org/10.12720/jcm.19.1.7-18


Review

For citations:


Nouar A., Tahar Abbes M., Boumerdassi S., Chaib M. Experimental results of using AES-128 in LoRaWAN. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2025;25(5):923-932. https://doi.org/10.17586/2226-1494-2025-25-5-923-932

Views: 13


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2226-1494 (Print)
ISSN 2500-0373 (Online)