Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes

The IoT-based smart grid provides many benefits to both energy consumers and energy producers, such as advanced metering functions, improved reliability, and management. Increasingly with the rise of smart homes and smart cities, security is a concern, as data networks increasingly run parallel to p...

Full description

Bibliographic Details
Main Authors: Luke Kane, Vicky Liu, Matthew McKague, Geoffrey R. Walker
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9874752/
_version_ 1798001023524012032
author Luke Kane
Vicky Liu
Matthew McKague
Geoffrey R. Walker
author_facet Luke Kane
Vicky Liu
Matthew McKague
Geoffrey R. Walker
author_sort Luke Kane
collection DOAJ
description The IoT-based smart grid provides many benefits to both energy consumers and energy producers, such as advanced metering functions, improved reliability, and management. Increasingly with the rise of smart homes and smart cities, security is a concern, as data networks increasingly run parallel to power networks. Ensuring good security practices are implemented in the smart home is critical. This study proposes a Home Area Network architecture design, and secure ChaCha20-Poly1305 Authenticated Encryption with Associated Data (AEAD) based authentication scheme, based on the recent LoRa 2.4 GHz technology; a robust and highly tunable transmission technology. This results in a network that balances performance considerations, whilst providing confidentiality, integrity and authenticity through the use of symmetric key-based authentication and encryption scheme. A performance analysis is conducted using a practical test bench to determine the impact that the proposed security mechanisms have on the LoRa network. The secure architecture proposed by this study has a minimal impact on the transmission time of a packet compared to a network with no security measures. This additional latency does not negatively impact on the smart home user in terms of network performance.
first_indexed 2024-04-11T11:29:27Z
format Article
id doaj.art-8014b5c8aa484c54b754e8d650a24f14
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-11T11:29:27Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-8014b5c8aa484c54b754e8d650a24f142022-12-22T04:26:12ZengIEEEIEEE Access2169-35362022-01-0110932129323010.1109/ACCESS.2022.32033879874752Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart HomesLuke Kane0https://orcid.org/0000-0002-3851-1987Vicky Liu1https://orcid.org/0000-0002-8122-2558Matthew McKague2https://orcid.org/0000-0002-3598-7541Geoffrey R. Walker3https://orcid.org/0000-0001-8137-9507Faculty of Science, Queensland University of Technology (QUT), Brisbane, QLD, AustraliaFaculty of Science, Queensland University of Technology (QUT), Brisbane, QLD, AustraliaFaculty of Science, Queensland University of Technology (QUT), Brisbane, QLD, AustraliaFaculty of Engineering, Queensland University of Technology (QUT), Brisbane, QLD, AustraliaThe IoT-based smart grid provides many benefits to both energy consumers and energy producers, such as advanced metering functions, improved reliability, and management. Increasingly with the rise of smart homes and smart cities, security is a concern, as data networks increasingly run parallel to power networks. Ensuring good security practices are implemented in the smart home is critical. This study proposes a Home Area Network architecture design, and secure ChaCha20-Poly1305 Authenticated Encryption with Associated Data (AEAD) based authentication scheme, based on the recent LoRa 2.4 GHz technology; a robust and highly tunable transmission technology. This results in a network that balances performance considerations, whilst providing confidentiality, integrity and authenticity through the use of symmetric key-based authentication and encryption scheme. A performance analysis is conducted using a practical test bench to determine the impact that the proposed security mechanisms have on the LoRa network. The secure architecture proposed by this study has a minimal impact on the transmission time of a packet compared to a network with no security measures. This additional latency does not negatively impact on the smart home user in terms of network performance.https://ieeexplore.ieee.org/document/9874752/IoTChaCha20Poly1350authenticationkey managementhome area network
spellingShingle Luke Kane
Vicky Liu
Matthew McKague
Geoffrey R. Walker
Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
IEEE Access
IoT
ChaCha20
Poly1350
authentication
key management
home area network
title Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
title_full Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
title_fullStr Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
title_full_unstemmed Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
title_short Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
title_sort network architecture and authentication scheme for lora 2 4 ghz smart homes
topic IoT
ChaCha20
Poly1350
authentication
key management
home area network
url https://ieeexplore.ieee.org/document/9874752/
work_keys_str_mv AT lukekane networkarchitectureandauthenticationschemeforlora24ghzsmarthomes
AT vickyliu networkarchitectureandauthenticationschemeforlora24ghzsmarthomes
AT matthewmckague networkarchitectureandauthenticationschemeforlora24ghzsmarthomes
AT geoffreyrwalker networkarchitectureandauthenticationschemeforlora24ghzsmarthomes