Explorando o RSSI na Geração de Chaves para LoRaWAN
Abstract
Criptography is critical to the security of wireless networks. In the context of LoRa for the Internet of Things, the symmetric key distribution is a challenge. As an alternative, it is possible to generate keys in a distributed manner, based on characteristics of the physical medium, such as the RSSI indicator. This work advances the study of this approach in the context of the RSSignal framework for LoRaWAN networks. The results suggest that, even in scenarios without mobility, the RSSI variance is sufficient for the key generation process. This work also presents the LoRa RSSI Grabber for collecting and storing the RSSI indicator, besides making a new dataset with real measurements publicly available to the community.
References
Bassham, L., Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., et al. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology - NIST.
da Cruz, P., Suyama, R., e Loiola, M. (2021). Increasing key randomness in physical layer key generation based on RSSI in LoRaWAN devices. Physical Communication, 49:101480.
de Oliveira, L., Chaves, L., e Silva, E. (2022). RSSignal: um arcabouço para evolução de técnicas de geração de chaves baseadas em RSSI. Em Anais do XXII SBSeg, páginas 111–124, Porto Alegre, RS, Brasil. SBC.
Goldoni, E., Savazzi, P., Favalli, L., e Vizziello, A. (2022). Correlation between weather and signal strength in LoRaWAN networks: An extensive dataset. Computer Networks, 202:108627.
Han, B., Li, Y., Wang, X., Li, H., e Huang, J. (2023). FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN. Future Generation Computer Systems, 140:253–265.
Han, B., Peng, S., Wu, C., Wang, X., e Wang, B. (2020). LoRa-based physical layer key generation for secure V2V/V2I communications. Sensors, 20(3):682.
Hershey, J., Hassan, A., e Yarlagadda, R. (1995). Unconventional cryptographic keying variable management. IEEE Transactions on Communications, 43(1):3–6.
Marton, K. e Suciu, A. (2015). On the interpretation of results from the NIST statistical test suite. Science and Technology, 18(1):18–32.
Mathur, S., Trappe, W., Mandayam, N., Ye, C., e Reznik, A. (2008). Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. Em Proc. of the 14th MobiCom, páginas 128–139, USA. ACM.
Ruotsalainen, H., Zhang, J., e Grebeniuk, S. (2020). Experimental investigation on wireless key generation for Low-Power Wide-Area Networks. IEEE Internet of Things Journal, 7(3):1745–1755.
Simka, M. e Polak, L. (2022). On the RSSI-based indoor localization employing LoRa in the 2.4 GHz ISM band. Radioengineering, 31(1):135–143.
Xu, W., Jha, S., e Hu, W. (2019). LoRa-Key: Secure key generation system for LoRabased network. IEEE Internet of Things Journal, 6(4):6404–6416.
