Air Raid Alert Mesh Network System: Key Provision

Authors

DOI:

https://doi.org/10.18372/1990-5548.84.20194

Keywords:

alert notification, communication system, LoRa, ATECC608A, key provision

Abstract

In the face of modern hybrid threats and infrastructure vulnerabilities, the timely and secure dissemination of air raid alerts is vital for civilian safety. Traditional centralized alert systems are susceptible to disruption, making decentralized wireless alternatives increasingly relevant. This paper presents a secure key provisioning framework for a decentralized air raid alert system built on LoRa-based mesh networking. Each node is equipped with a cryptographic identity stored in a hardware secure element (ATECC608A), enabling message authentication, signature verification, and node revocation without centralized control. The proposed system ensures that only trusted nodes can initiate or relay alert signals, effectively preventing spoofing, replay attacks, and unauthorized activations. A series of real-world tests and simulations demonstrates that the framework introduces minimal latency while significantly enhancing system resilience and trustworthiness. The results confirm the feasibility of a scalable, tamper-resistant alert network capable of operating under degraded or hostile conditions.

Author Biographies

Halyna Vlakh-Vyhrynovska , Lviv Polytechnic National University

Candidate of Science (Engineering)

Associate Professor

Department of Computerized Automatic Systems

Institute of Computer Technologies, Automation and Metrology

Yuriy Rudyy , Lviv Polytechnic National University

Postgraduate Student

Department of Computerized Automatic Systems

Institute of Computer Technologies, Automation and Metrology

References

A. Weinand, A. Becker, T. Haase and T. Mundt, “Physical Layer Security Based Key Management for LoRaWAN,” arXiv preprint, arXiv:2101.02975, 2021.

M. López Escobar, F. Granelli and P. Liò, “JMAC: A Cross-Layer Multi-Hop Protocol for LoRa Networks,” arXiv preprint, arXiv:2312.08387, 2023.

C. Chen, Y. Liu, and X. Zhang, “Adaptive Quantization for Physical-Layer Key Generation in LPWANs,” arXiv preprint, arXiv:2310.07853, 2023.

D. Zubow and M. Doering, “Security Analysis of LoRaWAN: Risks and Mitigation Strategies,” Future Internet, vol. 11, no. 3, 2019/2024. https://doi.org/10.3390/fi11010003

L. Hou, Y. Li, and M. Ma, “HyperLoRa: Blockchain-Enabled Secure LoRa Networks,” arXiv preprint, arXiv:2105.10103, 2021.

N. Pérez et al., “Performance Evaluation of a Mesh-Topology LoRa Network Using ns-3,” Sensors, MDPI, vol. 25, 2025. https://doi.org/10.3390/s25051602

Downloads

Published

2025-06-30

Issue

Section

COMPUTER ENGINEERING