Implementation of Security in LoRaWAN Network Using Speck Algorithm and Message Authentication Code
DOI:
https://doi.org/10.33795/jartel.v14i4.5296Keywords:
Cryptography, Encryption, LoRa, MAC, SniffingAbstract
Long Range (LoRa) is a wireless technology that provides long-range and low-power communication. However, LoRa still has weaknesses when it comes to data transmission processes, making it vulnerable to attacks. One of the common attacks during data transmission in LoRaWAN is sniffing or data theft. This research aims to create a system that can protect LoRa devices from attacks that could lead to data leakage to unauthorized parties. The research findings indicate that implementing encryption systems on LoRa using Speck and Message Authentication Code algorithms can secure LoRa devices from sniffing attacks, preventing sniffers or attacking nodes from successfully reading or altering messages sent by the sender. The implementation of encryption systems on devices affects network performance, such as packet errors, packet loss, delay, and throughput. Based on 100 experiments conducted, the encrypted system resulted in 7 packet errors and 15 packet losses, while the unencrypted devices produced 2 packet errors and 9 packet losses. The average delay for messages generated by unencrypted devices was 83 milliseconds, whereas the average delay for encrypted messages was 1.109 milliseconds or 1 second 109 milliseconds. The throughput for devices with encryption had an average value of 3224.146 KBps, while devices without encryption had an average value of 6286.252 KBps. The LoRa used in the research operates at a frequency of 433 MHz. This system employs Speck 128-bit encryption, allowing a maximum message size of 16 characters. Based on the research findings, devices with encryption affect network performance by increasing the number of packet errors and losses, resulting in longer delays and decreased throughput.
References
A. Augustin, J. Yi, T. Clawsen dan M. W. Townsley, “A Study of LoRa: Long Range & Low Power Networks for the Internet of Things,” sensors, vol. 3, pp. 2-18, 2016.
J. d. C. Silva, A. M. Albert, J. Rodrigues dan P. Šolić, “LoRaWAN - A Low Power WAN Protocol for Internet of Things: a Review and Opportunities,” dalam International Multidisciplinary Conference on Computer and Energy Science, Split, Croatia, 2017.
A. R. Fauzi, “Monitoring jaringan wireless terhadap serangan paket sniffing,” Jurnal Manajemen Informatika, vol. 8, pp. 11-18, 2018.
N. b. Anwar, M. Hasan, J. Z. Loren dan T. Hossain, “Comparative Study of Cryptography Algorithms and Its’ Applications,” International Journal of Computer Networks and Communications Security, Vol. 7, no. 5.
M. Benssalah, Y. Rhaskali dan K. drouiche, “An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography,” Multimedia Tools and Applications, vol. 80, pp. 2081-2107, 2021.
M. Khari, A. K. Garg dan A. H. Gandomi, “Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, p. 73–80, 2020.
O. F. A. Wahab, A. A. M. Khalaf, A. I. Hussein dan H. F.A. Hamed, “Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques,” IEEE Access, vol. 9, p. 31805–31815, 2021.
E. Hureib dan A. Gutub, “Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography,” IJCSNS International Journal of Computer Science and Network Security, vol. 20, 2020.
F. Q. Alyousuf, F. Qasim, A. Al-Yousuf dan R. Din, “Review on secured data capabilities of cryptography, steganography, and watermarking domain Topic identification using filtering and rule generation algorithm for textual document View project The modeling of E- Supervised (E- SUV) for distance learning,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 17, p. 1053–1059, 2020.
Z. Alqad, M. Oraiqat, A. H. Al-Saleh, . S. Hind, A. Husban dan S. Al-Rimawi, “International Journal of Computer Science and Mobile Computing A New Approach for Data Cryptography,” International Journal of Computer Science and Mobile Computing , vol. 8, 2019.
Z. Qowi dan N. Hudallah, “Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm,” Journal of Physics: Conference Series, p. 1918, 2021.
M. M. Abu-Faraj, K. Aldebei dan . Z. A. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography,” Traitement Du Signal, vol. 39, p. 173– 178, 2022.
R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks dan L. Wingers, “The SIMON and SPECK Families of Lightweight Block Ciphers,” Proceeding of the 52nd Annual Design Automation Conference on - DAC '15, pp. 48-56, 2013.
M. Bellare, R. Canetti dan H. Krawczyk, “Keying Hash Functions for Message Authentication,” International Association for Cryptologic Research, 1996.
R. I. Lestari, V. Suryani dan A. W. Arif, “Implementasi Pengamanan Pada Jaringan LoRaWAN Untuk Mengatasi Serangan Sniffing dengan Menggunakan Digital Signature.,” E proceeding of Engineering, vol. 7, pp. 7983-7994, 2020.
