Experimental results of using AES-128 in LoRaWAN
https://doi.org/10.17586/2226-1494-2025-25-5-923-932
Abstract
In the Internet of Things (IoT), Low Power Wide Area Networks (LPWAN) technologies have been obtaining considerable attention. Long-Range Wide-Area Networks (LoRaWAN) was created by the Long Range (LoRa) Alliance as an open standard operating over the unlicensed band. Its advantages include a large coverage area, low power consumption, and inexpensive transceiver chips. The standard of LoRaWAN encryption uses a 128-bit symmetric algorithm called Advanced Encryption Standard (AES). This standard secures communication and entities which are beneficial for resource-constrained devices on the IoT for efficient communication and security. The security problems with LoRa networks and devices remain an important challenge considering the technology large deployment for numerous applications. Even though LoRaWAN network architecture and security have been enhanced by the LoRa Alliance, the most recent version still has some weaknesses such as its susceptibility to attacks. Many studies and researchers have indicated that LoRaWAN versions 1.0 and 1.1 have security risks and vulnerabilities. This research proposes a method to construct and integrate cryptographic algorithms (AES-128) within widely utilized wireless Network Server Simulators NS-3. This module aims to increase the security of data in LoRa networks by protecting critical information from unauthorized access. Consequently, implementing the AES-128 encryption algorithm within the NS-3 simulator will benefit the scientific community greatly. This will enable an examination of the impact of various security measures on network performance metrics, including latency, overhead, energy consumption, throughput, and packet size.
About the Authors
A. NouarAlgeria
Abdelouahab Nouar — PhD Student
sc 58865584200
Chlef, 02010
M. Tahar Abbes
Algeria
Mounir Tahar Abbes — Professor
sc 57212811077
Chlef, 02010
S. Boumerdassi
France
Selma Boumerdassi — Professor
sc 6602291128
Paris, 75141
M. Chaib
Algeria
Mostefa Chaib — PhD, Researcher
sc 58835296600
Chlef, 02010
References
1. Mostefa C., Mounir T.A., Abdelmadjid A.M., Nouar A. Ft-CSMA: A fine-tuned CSMA protocol for LoRa-based networks. Journal of Communications, 2024, vol. 19, no. 2, pp. 65–77. https://doi.org/10.12720/jcm.19.2.65-77
2. Umbreen S., Shehzad D., Shafi N., Khan B., Habib U. An energyefficient mobility-based cluster head selection for lifetime enhancement of wireless sensor networks. IEEE Access, 2020, vol. 8, pp. 207779–207793. https://doi.org/10.1109/access.2020.3038031
3. Mostefa C., Abdelouahab N., Mounir T.A., Boumerdassi S., Femmam S., Amel Z.A. Formal validation of ADR protocol in LoRaWAN network using Event-b. Proc. of the 7th International Conference on Computer, Software and Modeling (ICCSM), 2023, pp. 11–15. https://doi.org/10.1109/ICCSM60247.2023.00011
4. Sornin N., Luis M., Eirich T., Kramp T., Hersent O. LoRaWAN Specification. V. 1. LoRa Alliance Inc., 2015, 82 p.
5. LoRaWAN® L2 1.0.4 Specification (TS001-1.0.4). Lora Alliance Technical Committee, 2020, 90 p.
6. Butun I., Pereira N., Gidlund M. Analysis of LoRaWAN v1.1 security: research paper. Proc. of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, 2018, pp. 1–6. https://doi.org/10.1145/3213299.3213304
7. Andreas W., de la Fuente A.G., Christoph L., Michael K. Physical layer security based key management for LoRaWAN. arXiv, 2021, arXiv:2101.02975. https://doi.org/10.48550/arXiv.2101.02975
8. El Fehri C., Baccour N., Berthou P., Kammoun I. Experimental analysis of the over-the-air activation procedure in LoRaWAN. Proc. of the 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2021, pp. 30–35. https://doi.org/10.1109/wimob52687.2021.9606301
9. Tsai K.-L., Leu F.-Y., Hung L.-L., Ko C.-Y. Secure session key generation method for LoRaWAN servers. IEEE Access, 2020, vol. 8, pp. 54631–54640. https://doi.org/10.1109/ACCESS.2020.2978100
10. Hessel F., Almon L., Alvarez F. ChirpOTLE: a framework for practical LoRaWAN security evaluation. Proc. of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, pp. 306–316. https://doi.org/10.1145/3395351.3399423
11. Pospisil O., Fujdiak R., Mikhaylov K., Ruotsalainen H., Misurec J. Testbed for LoRaWAN security: design and validation through manin-the-middle attacks study. Applied Sciences, 2021, vol. 11, no. 16, pp. 7642. https://doi.org/10.3390/app11167642
12. Tsai K.-L., Leu F.-Y., You I., Chang S.-W., Hu S.-J., Park H. Lowpower AES data encryption architecture for a LoRaWAN. IEEE Access, 2019, vol. 7, pp. 146348–146357. https://doi.org/10.1109/access.2019.2941972
13. Thaenkaew P., Quoitin B., Meddahi A. Evaluating the cost of beyond AES-128 LoRaWAN security. Proc. of the International Symposium on Networks, Computers and Communications (ISNCC), 2022, pp. 1–6. https://doi.org/10.1109/isncc55209.2022.9851811
14. Naoui S., Elhdhili M.E., Saidane L.A. Trusted third party based key management for enhancing LoRaWAN security. Proc. of the IEEE/ ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017, pp. 1306–1313. https://doi.org/10.1109/AICCSA.2017.73
15. Jalowiczor J., Rozhon J., Voznak M. Study of the efficiency of fog computing in an optimized LoRaWAN cloud architecture. Sensors, 2021, vol. 21, no. 9, pp. 3159. https://doi.org/10.3390/s21093159
16. Qadir J., Butun I., Gastaldo P., Aiello O., Caviglia D.D. Mitigating cyber attacks in LoRaWAN via lightweight secure key management scheme. IEEE Access, 2023, vol. 11, pp. 68301–68315. https://doi.org/10.1109/ACCESS.2023.3291420
17. Hanna Y., Cebe M., Leon J., Akkaya K. Efficient group key management for resilient operation of LoRaWAN-based smart grid applications. IEEE Transactions on Control Systems Technology, 2024, vol. 32, no. 5, pp. 1706–1717. https://doi.org/10.1109/tcst.2024.3378988
18. Han B., Li Y., Wang X., Li H., Huang J. FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN. Future Generation Computer Systems, 2023, vol. 140, pp. 253–265. https://doi.org/10.1016/j.future.2022.10.018
19. Islam M., Jamil H.M.M., Pranto S.A., Das R.K., Amin A., Khan A. Future industrial applications: exploring LPWAN-driven IoT protocols. Sensors, 2024, vol. 24, no. 8, pp. 2509. https://doi.org/10.3390/s24082509
20. Na S., Hwang D., Shin W., Kim K.-H. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. Proc. of the International Conference on Information Networking (ICOIN), 2017, pp. 718–720. https://doi.org/10.1109/ICOIN.2017.7899580
21. Kang J.-M., Lim D.-W. On the quasi-orthogonality of LoRa modulation. IEEE Internet of Things Journal, 2023, vol. 10, no. 14, pp. 12366–12378. https://doi.org/10.1109/jiot.2023.3245885
22. Tsai K.-L., Huang Y.-L., Leu F.-Y., You I., Huang Y.-L., Tsai C.-H. AES-128 based secure low power communication for LoRaWAN IoT environment. IEEE Access, 2018, vol. 6, pp. 45325–45334. https://doi.org/10.1109/access.2018.2852563
23. Abboud S., Abdoun N. Enhancing LoRaWAN security: an advanced AES-based cryptographic approach. IEEE Access, 2024, vol. 12, P. 2589–2606. https://doi.org/10.1109/ACCESS.2023.3348416
24. Nouar A., Abbes M.T., Boumerdassi S., Chaib M. Impact of mobility model on LoRaWAN performance. Journal of Communications, 2024, vol. 19, no. 1. pp. 7–18. https://doi.org/10.12720/jcm.19.1.7-18
Review
For citations:
Nouar A., Tahar Abbes M., Boumerdassi S., Chaib M. Experimental results of using AES-128 in LoRaWAN. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2025;25(5):923-932. https://doi.org/10.17586/2226-1494-2025-25-5-923-932































