Detailed Information

Cited 0 time in webofscience Cited 30 time in scopus
Metadata Downloads

Low-Power AES Data Encryption Architecture for a LoRaWAN

Full metadata record
DC Field Value Language
dc.contributor.authorTsai, Kun-Lin-
dc.contributor.authorLeu, Fang-Yie-
dc.contributor.authorYou, Ilsun-
dc.contributor.authorChang, Shuo-Wen-
dc.contributor.authorHu, Shiung-Jie-
dc.contributor.authorPark, Hoonyong-
dc.date.accessioned2021-08-11T11:23:36Z-
dc.date.available2021-08-11T11:23:36Z-
dc.date.issued2019-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/5309-
dc.description.abstractIn recent years, the Internet of Things (IoT) has significantly increased the number of Internet connections to a large number of objects in different domains, including industry, homes and transportation. The LoRaWAN developed by the LoRa Alliance is a long-range wide area network specification suitable for an IoT environment due to its low-power communication. It provides a star-of-stars topology, well-defined MAC layer protocol and three communication modes to further lower its power consumption and employs the Advanced Encryption Standard (AES) cryptography and several session keys to increase its network security. However, for battery powered IoT end nodes, the AES encryption process consumes some amounts of power owing to involving multiple cycles of repetition. To solve this problem, in this study, we propose a low power consumed AES encryption architecture, named Low-Power AES Data Encryption Architecture (LPADA), which reduces the power consumed by the AES for data encryption by using low power SBox, power gating technique and power management method. A key updating procedure is also proposed to increase the security of the session-key renewal. The system is simulated using the Synopsys library with five different supply voltages. The experimental results show that 62.0% of dynamic power reduction and 88.5% of leakage power lowering have been achieved compared to the power consumed by traditional AES data encryption. The security analysis also shows that the key updating procedure for the LPADA enables mutual authentication between end nodes and application servers, and resists replay attacks and eavesdropping attacks from hackers.-
dc.format.extent10-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleLow-Power AES Data Encryption Architecture for a LoRaWAN-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2019.2941972-
dc.identifier.scopusid2-s2.0-85078897419-
dc.identifier.wosid000498824600001-
dc.identifier.bibliographicCitationIEEE Access, v.7, pp 146348 - 146357-
dc.citation.titleIEEE Access-
dc.citation.volume7-
dc.citation.startPage146348-
dc.citation.endPage146357-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordPlusCHALLENGES-
dc.subject.keywordPlusKEY-
dc.subject.keywordAuthorLow power-
dc.subject.keywordAuthorAES-
dc.subject.keywordAuthorLoRaWAN-
dc.subject.keywordAuthorpower gating-
dc.subject.keywordAuthorpower management-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE