Matrix type key management method for LoRaWAN

A key management, matrix technology, applied in the field of matrix key management for LoRaWAN, to achieve the effect of security improvement, efficient key update, and security improvement

Active Publication Date: 2018-03-27
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the object of the present invention is to provide a kind of matrix type key management method for LoRaWAN, by introducing a kind of existing improved Blom key management scheme, improve LoRaWAN security; The configuration method and the method of calculating the negotiation information by using the content of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Matrix type key management method for LoRaWAN
  • Matrix type key management method for LoRaWAN
  • Matrix type key management method for LoRaWAN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0047]The embodiment of the present invention provides a matrix key management method for LoRaWAN, which solves the problem of using the matrix key management method in LoRa by combining the interaction data specified by LoRa during network access interaction and WOR technology. And it can efficiently update the key periodically. In an embodiment, the default network selects a 128-bit session key and stores it in an array of unsigned characters.

[0048] There are two message types in the LoRa protocol, one is the network message type, and the other is the data message type. The main message type related to the present invention is the network access message, and the network access message is divided into two types: the network access application message is shown in Table 1, and the network access reply message is shown in Table 2.

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a matrix type key management method for LoRaWAN, and belongs to the field of the wireless wide area network. The method comprises the following steps: generating a symmetrix matrix of the key computation by using a random number seed pool R and a line limit number M, and accomplishing the negotiation in the key establishment with the help of the existing AppEUI, AppNonce and DevNonce in the LoRa access interaction message; generating the auxiliary material required by the individual key by using the specific message content of the LoRa and the character thereof; computing by using the matrix type matrix to obtain the AppSKey and NwkSKey required by the LoRa; and realizing the key update based on the WOR function by using the specific CAD mode of the LoRa radio frequency chip. Through the method disclosed by the invention, the conflict between the improved Blom key management key and the LoRa protocol is solved, and the security of the LoRa network has a certainimprovement.

Description

technical field [0001] The invention belongs to the field of wireless wide area networks, and relates to a matrix key management method for LoRaWAN. Background technique [0002] LoRaWAN (Long Range Wide Area Network) is a network with long-distance transmission capabilities formed using special modulation and demodulation technology, developed by Semtech. Its design purpose is mainly to realize wide-area network for long-distance communication with low power consumption. [0003] LoRaWAN is mainly composed of three entities: terminals, gateways, and network servers. The LoRa protocol mainly serves application scenarios that require long-distance communication. The LoRa protocol mainly involves physical layer standards such as modulation and demodulation and MAC layer standards. In terms of network security, through a fixed pre-configured key combined with two parameters "DevNonce, the terminal generates a random number" and "AppNonce, the server generates a random number...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04W52/02
CPCH04L9/0838H04L9/0866H04L9/0869H04L9/0891H04W52/0229Y02D30/70
Inventor 王浩杨晗王平马展李勇
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products