Putri Apriyanti Windya, V. Suryani, Aulia Arif Wardana
{"title":"Sniffing Prevention in LoRa Network Using Combination of Advanced Encryption Standard (AES) and Message Authentication Code (MAC)","authors":"Putri Apriyanti Windya, V. Suryani, Aulia Arif Wardana","doi":"10.1109/ICADEIS52521.2021.9702081","DOIUrl":null,"url":null,"abstract":"One of the characteristics of IoT devices is related to their limited resources. These devices are often referred to as IoT-constrained devices. The limited resources of IoT devices becomes a challenge in choosing an appropriate security method. To overcome this problem, an appropriate security method in the use of AES algorithms and MAC is deemed important. The variants of AES algorithm used in this research included AES128 and AES256. Meanwhile, the MAC algorithm used was Hash-based Message Authentication Code (HMAC). This paper presents how to prevent the sniffing activity on wireless sensor network - especially in LoRa networks due to the increasing use of LoRa, as well as the development of IoT devices. Based on the results of the security analysis that has been done, this method was found to be able to guarantee the aspects of confidentiality, authentication, and integrity. In this paper, overhead analysis on IoT constrained devices class 0 and class 2 was also performed with the results showing that this method was acceptable to be implemented on IoT constrained devices class 0 and class 2.","PeriodicalId":422702,"journal":{"name":"2021 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICADEIS52521.2021.9702081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
One of the characteristics of IoT devices is related to their limited resources. These devices are often referred to as IoT-constrained devices. The limited resources of IoT devices becomes a challenge in choosing an appropriate security method. To overcome this problem, an appropriate security method in the use of AES algorithms and MAC is deemed important. The variants of AES algorithm used in this research included AES128 and AES256. Meanwhile, the MAC algorithm used was Hash-based Message Authentication Code (HMAC). This paper presents how to prevent the sniffing activity on wireless sensor network - especially in LoRa networks due to the increasing use of LoRa, as well as the development of IoT devices. Based on the results of the security analysis that has been done, this method was found to be able to guarantee the aspects of confidentiality, authentication, and integrity. In this paper, overhead analysis on IoT constrained devices class 0 and class 2 was also performed with the results showing that this method was acceptable to be implemented on IoT constrained devices class 0 and class 2.