Nowadays, numerous devices are utilizing the IoT world, connecting and providing access to data and sensor measurements in vast networks of interconnected objects and devices. Considering the great communication dista...
详细信息
ISBN:
(纸本)9798350362480
Nowadays, numerous devices are utilizing the IoT world, connecting and providing access to data and sensor measurements in vast networks of interconnected objects and devices. Considering the great communication distances that need to be covered occasionally, the LoRaWAN network was proposed as it employs Low Power (LP) and Long Range (LoRa) protocols that reduce device energy consumption while maximizing communication range. A gateway to the cloud authenticates LoRaWAN IoT devices before data transmission. This procedure begins with an unencrypted Join Request. A Join Request includes, among others, a Message Integrity Code (MIC), which is the result of encrypting the unencrypted contents of the message using an AppKey that is securely stored both in the cloud and the IoT device. However, malicious actors acting as Man-In-the-Middle (MITM) can interfere in the communication channel, reverse engineer the MIC value, and derive the AppKey. They can then initiate a Join Request that is misinterpreted as coming from a legitimate device and gain access to the communication channel. This paper introduces a novel approach that focuses on the continuous regeneration of the AppKey, necessitating frequent re-joining and re-authentication of IoT devices within the network. The suggested method, which can be added as an extra layer of security in LoRaWAN networks, uses a key rolling technique similar to the one used in automobile central locking systems, and is developed as an optimised and scalable microservice for various LoRaWAN installations and versions. Through the evaluation process, significant findings emerged, demonstrating the effectiveness of the proposed security solution in mitigating replay attacks. The system successfully prevented the server from getting flooded by malicious packets, distinguishing it from a system lacking the proposed mechanism. Remarkably, this accomplishment was made without causing any noticeable delay to the communication process. In addit
There is a growing reliance on surveillance systems for law enforcement and public safety purposes. Video surveillance scenarios, such as those seen in train stations, schools, and hospitals, must automatically detect...
详细信息
Generative artificial intelligence (AI) has revolutionized AI by enabling high-fidelity content creation across text, images, audio, and structured data. This survey explores the core methodologies, advancements, appl...
详细信息
Modern society strives for simpler, more efficient, dependable, speedier, and more automated lifestyle. Existing vegetable cutters in the market have drawbacks such as high investment costs, additional manpower, and t...
详细信息
In recent years, the protection of so-called "soft targets", has become an increasingly important and challenging issue. The complexity and seriousness of this security threat have been growing exponentially...
详细信息
Modified Walsh-Hadamard code division multiplexing (MWHCDM) is a promising solution for the degradation of bit error rate (BER) performance due to the periodic blockage (PB) of the channel caused by rotor blades in he...
详细信息
Lung tumours are masses of tissue that arise abnormally in the lung organ. In the field of medicine, One means of detecting and analyzing lung tumours is to use Computed Tomography (CT) scan images, where doctors see ...
详细信息
A pedagogical agent is an animated interface in an interactive online learning environment. Its role involves guiding users through instructions and participating in direct discussions. Numerous research studies under...
详细信息
With regard to Agriculture 5.0, the goal of this research is to create an intelligent platform for multi-drone collaboration that will improve situational awareness. This study examines the crucial phases in the Sensi...
详细信息
The current study focuses on the development of an open-source framework which is outsourcing the lack of expressivity of the standardized Planning Domain Definition Language – PDDL, leveraging the capacity and flexi...
详细信息
暂无评论