APPLICATION OF HARMFUL LDPC CODES IN THE LORAWAN STANDARD

Authors

DOI:

https://doi.org/10.18372/2225-5036.29.17871

Keywords:

LoRaWAN, means of cryptographic protection of information, crypto-code structures, loss-making LDPC codes

Abstract

In the conditions of the growth of Internet of Things technologies, ensuring information security is becoming an urgent problem. It has been determined that LoRaWAN is currently the most promising wireless communication network for the Internet of Things (IoT). However, the proprietary LoRa modulation and encryption technology is "covered" by Semetech's patent, leading to cyber-incidents of reverse-engineering keys from the device; hacking the network using default credentials or vulnerability and stealing keys from the server. As a means of improving the existing algorithm, it is proposed to integrate into the existing hardware part of the IoT device an additional microcontroller (a means of cryptographic protection of information) with built-in algorithms of McEliece and Niederreiter crypto-code structures on modified LDPC codes in order to strengthen the encryption algorithms of LoRaWAN technology used in data transmission in the middle of the network and to ensure the security of the external circuit, it is suggested to use a developed server, which is physically located in the place where the gateway with access to the external communication channel of the Internet will be located.

References

. Y. Feng, W. Wang, Y. Weng and H. Zhang, "A Replay-Attack Resistant Authentication Scheme for the Internet of Things," 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiq-uitous Computing (EUC), Guangzhou, China, 2017, pp. 541-547, DOI: 10.1109/CSE-EUC.2017.101.

. Singh, S., Sharma, P.K., Moon, S.Y. et al. Ad-vanced lightweight encryption algorithms for IoT devic-es: survey, challenges and solutions. J Ambient Intell Human Comput (2017). https://doi.org/10.1007/s12652-017-0494-4.

. 3GPP Release 13 Specification //https://www. 3gpp.org/ftp/Information/WORK_PLAN/Description_ Releases/.

. LoRaWAN® Is Secure (but Implementation Matters)//https://lora-alliance.org/resource_hub/lora-wan-is-secure-but-implementation-matters/.

. Jan Broul´ım. LDPC codes - new methodologies / PhD thesis, University of West Bohemia, August 2018, p. 127.

. Hai Zhu, Liqun Pu, Hengzhou Xu, and Bo Zhang. Construction of Quasi-Cyclic LDPC Codes Based on Fundamental Theorem of Arithmetic / Wireless Communications and Mobile Computing, Volume 2018, Article ID 5264724, 9 pages. https://doi.org/10.1155/2018/ 5264724.

. S. Yevseiev, H. Kots, and Y. Liekariev, “Devel-oping of multi-factor authentication method based on Niederreiter-McEliece modified crypto-code system”, Eastern-European Journal of Enterprise Technologies, 6/4(84), 2016, pp. 11-23.

. S. Yevseiev, S. Pohasii, V. Khvostenko. Devel-opment of a protocol for a closed mobile internet chan-nel based on post-quantum algorithms. Системи оброб-ки інформації. 2021. № 3(166). С. 35-40. https://doi.org/ 10.30748/soi.2021.166.03.

Published

2023-09-15