用户名: 密码: 验证码:
基于信誉评价机制的LoRa物联网安全架构
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Security Architecture of LoRa Internet of Things Based on Reputation Evaluation Mechanism
  • 作者:杨阳 ; 王运兵 ; 唐六华 ; 刘昕
  • 英文作者:YANG Yang;WANG Yunbing;TANG Liuhua;LIU Xin;No.30 Institute of CETC;China University of Petroleum(East China);
  • 关键词:物联网 ; LoRaWAN ; 信誉评价 ; 安全加固
  • 英文关键词:Internet of Things;;LoRaWAN;;reputation evaluation;;security reinforcement
  • 中文刊名:JSSG
  • 英文刊名:Computer & Digital Engineering
  • 机构:中国电子科技集团公司第三十研究所;中国石油大学(华东);
  • 出版日期:2019-02-20
  • 出版单位:计算机与数字工程
  • 年:2019
  • 期:v.47;No.352
  • 基金:国家自然科学基金青年科学基金项目(编号:61309024)资助
  • 语种:中文;
  • 页:JSSG201902024
  • 页数:6
  • CN:02
  • ISSN:42-1372/TP
  • 分类号:122-127
摘要
论文基于LoRa最新协议标准LoRaWAN1.1的网络架构,分析了LoRa物联网的安全需求,并根据现有安全机制和不足,提出了一种基于信誉评价机制的LoRa物联网安全加固方案。最后,对提出的方案进行了安全评估,该方案不仅能很好地解决网关安全问题,还能优化网络负载,并使网络具备入侵检测和应急管控能力。
        Based on the network architecture of LoRaWAN1.1,the latest protocol standard of LoRa,this paper analyzes thesecurity requirements of LoRa Internet of Things. According to the existing security mechanisms and deficiencies,a security rein-forcement scheme for LoRa Internet of Things based on reputation evaluation mechanism is proposed. Finally,the proposed schemeis evaluated for security. The scheme can not only solve the security problem of gateway,but also optimize the network load,andmake the network have the ability of intrusion detection and emergency management and control.
引文
[1]武传坤.物联网安全关键技术与挑战[J].密码学报,2015,2(1):40-53.WU Chuankun. An overview on the security techniquesand challenges of the Internet of things[J]. Journal ofCryptologic Research,2015,2(1):40-53.
    [2]夏莹莹,刘琛,邵震. LPWA,物联网产业发展的新机遇[J].通信企业管理,2015(10):68-70.XIA Yingying,LIU Chen,SHAO Zhen. LPWA,New Op-portunity for the Development of Internet of Things Indus-try[J]. Communications Enterprise Management,2015(10):68-70.
    [3]Sinha R S,Wei Y,Hwang S H. A survey on LPWA tech-nology:LoRa and NB-IoT[J]. Ict Express,2017,3(1):16-21.
    [4]Raza U,Kulkarni P,Sooriyabandara M. Low Power WideArea Networks:An Overview[J]. IEEE CommunicationsSurveys&Tutorials,2017,19(2):855-873.
    [5]郑宁,杨曦,吴双力.低功耗广域网络技术综述[J].信息通信技术,2017(1):47-54.ZHENG Ning,YANG Xi,WU Shuangli. A Survey of Low-Power Wide-Area Network Technology[J]. Information&Communications Technologies,2017(1):47-54.
    [6]王阳,温向明,路兆铭,等.新兴物联网技术——LoRa[J].信息通信技术,2017(1):55-59.WANG Yang,WEN Xiangming,LU Zhaoming,et al.Emerging Internet of Things Technology——LoRa[J]. In-formation&Communications Technologies,2017(1):55-59.
    [7]赵静,苏光添. LoRa无线网络技术分析[J].移动通信,2016,40(21):50-57.ZHAO Jing,SU Guangtian. Analysis on LoRa WirelessNetwork Technology[J]. Mobile Communications,2016,40(21):50-57.
    [8]崔光耀.物联网:发展的风口与安全的浪尖——写在世界物联网博览会召开之际[J].中国信息安全,2017(8):44-47.CUI Guangyao. Internet of Things:The cusp of develop-ment and the wave of security——written on the occasionof the World Internet of Things Expo[J]. China Informa-tion Security,2017(8):44-47.
    [9]王于波,李延,秦理想,等.基于LoRa技术的电力抄表模块研究[J].国外电子测量技术,2018(1):46-51.WANG Yubo,LI Yan,QIN Lixiang,et al. Research onPower Meter Reading Module Based on LoRa Technology[J]. Foreign Electronic Measurement Technology,2018(1):46-51.
    [10]刘琛,邵震,夏莹莹.低功耗广域LoRa技术分析与应用建议[J].电信技术,2016,1(5):43-46.LIU Chen,SHAO Zhen,XIA Yingying. Analysis andApplication Suggestions of Low Power Wide Area LoRaTechnology[J]. Telecommunications Technology,2016,1(5):43-46.
    [11]赵小飞.低功耗广域物联网市场竞争及发展路径研究[J].电信网技术,2017(5):52-56.ZHAO Xiaofei. Research on Competition and Develop-ment Path of Low Power Wide Area Internet of ThingsMarket[J]. Telecommunications Network Technology,2017(5):52-56.
    [12]王永斌,张忠平.低功率、大连接广域物联网接入技术及部署策略[J].信息通信技术,2017(1):27-32.WANG Yongbin,ZHANG Zhongping. Low Power,LargeConnection Wide Area Internet of Things Access Tech-nology and Deployment Strategy[J]. Information&Com-munications Technologies,2017(1):27-32.
    [13]Miller R. LoRa Security:Building a Secure LoRa Solution[EB/OL].https://labs.mwr-infosecurity.com/publications/lo/,2018-08-30.
    [14]Aras E,Ramachandran G S,Lawrence P,et al. Explor-ing the Security Vulnerabilities of LoRa[C]//IEEE Inter-national Conference on Cybernetics. IEEE,2017:1-6.
    [15]Oniga B,Dadarlat V,Poorter E D,et al. A secure Lo-RaWAN sensor network architecture[C]//Sensors.IEEE,2017:1-3.
    [16]Oniga B,Dadarlat V,Poorter E D,et al. Analysis,de-sign and implementation of secure LoRaWAN sensor net-works[C]//IEEE International Conference on IntelligentComputer Communication and Processing. IEEE,2017:421-428.
    [17]LoRa Alliance Technical Committee. LoRaWAN?Speci-fication v1.1.[EB/OL].https://lora-alliance.org/re-source-hub/lorawantm-specification-v11,2018-08-30.
    [18]Lavric A,Petrariu A I. LoRaWAN communication proto-col:The new era of IoT[C]//International Conferenceon Development and Application Systems. IEEE,2018:74-77.
    [19]周彩秋,杨余旺,王永建.无线传感器网络节点行为度量方案[J].清华大学学报(自然科学版),2017(1):39-43.ZHOU Caiqiu,YANG Yuwang,WANG Yongjian. Behav-ior measurement scheme for the wireless sensor networknodes[J]. Journal of Tsinghua University(Science andTechnology),2017(1):39-43.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700