APPLICATION OF HARMFUL LDPC CODES IN THE LORAWAN STANDARD
DOI:
https://doi.org/10.18372/2225-5036.29.17871Keywords:
LoRaWAN, means of cryptographic protection of information, crypto-code structures, loss-making LDPC codesAbstract
In the conditions of the growth of Internet of Things technologies, ensuring information security is becoming an urgent problem. It has been determined that LoRaWAN is currently the most promising wireless communication network for the Internet of Things (IoT). However, the proprietary LoRa modulation and encryption technology is "covered" by Semetech's patent, leading to cyber-incidents of reverse-engineering keys from the device; hacking the network using default credentials or vulnerability and stealing keys from the server. As a means of improving the existing algorithm, it is proposed to integrate into the existing hardware part of the IoT device an additional microcontroller (a means of cryptographic protection of information) with built-in algorithms of McEliece and Niederreiter crypto-code structures on modified LDPC codes in order to strengthen the encryption algorithms of LoRaWAN technology used in data transmission in the middle of the network and to ensure the security of the external circuit, it is suggested to use a developed server, which is physically located in the place where the gateway with access to the external communication channel of the Internet will be located.
References
. Y. Feng, W. Wang, Y. Weng and H. Zhang, "A Replay-Attack Resistant Authentication Scheme for the Internet of Things," 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiq-uitous Computing (EUC), Guangzhou, China, 2017, pp. 541-547, DOI: 10.1109/CSE-EUC.2017.101.
. Singh, S., Sharma, P.K., Moon, S.Y. et al. Ad-vanced lightweight encryption algorithms for IoT devic-es: survey, challenges and solutions. J Ambient Intell Human Comput (2017). https://doi.org/10.1007/s12652-017-0494-4.
. 3GPP Release 13 Specification //https://www. 3gpp.org/ftp/Information/WORK_PLAN/Description_ Releases/.
. LoRaWAN® Is Secure (but Implementation Matters)//https://lora-alliance.org/resource_hub/lora-wan-is-secure-but-implementation-matters/.
. Jan Broul´ım. LDPC codes - new methodologies / PhD thesis, University of West Bohemia, August 2018, p. 127.
. Hai Zhu, Liqun Pu, Hengzhou Xu, and Bo Zhang. Construction of Quasi-Cyclic LDPC Codes Based on Fundamental Theorem of Arithmetic / Wireless Communications and Mobile Computing, Volume 2018, Article ID 5264724, 9 pages. https://doi.org/10.1155/2018/ 5264724.
. S. Yevseiev, H. Kots, and Y. Liekariev, “Devel-oping of multi-factor authentication method based on Niederreiter-McEliece modified crypto-code system”, Eastern-European Journal of Enterprise Technologies, 6/4(84), 2016, pp. 11-23.
. S. Yevseiev, S. Pohasii, V. Khvostenko. Devel-opment of a protocol for a closed mobile internet chan-nel based on post-quantum algorithms. Системи оброб-ки інформації. 2021. № 3(166). С. 35-40. https://doi.org/ 10.30748/soi.2021.166.03.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.