• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • Automotive
    • Connectivity
    • Consumer Electronics
    • Industrial
    • Medical
    • Security
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Videos
    • TI Microcontroller Videos
  • EE Resources
    • DesignFast
    • eBooks / Tech Tips
    • FAQs
    • LEAP Awards
    • Podcasts
    • Webinars
    • White Papers
  • EE Learning Center

Cybersecurity basics: Server and end device relationship to LoRaWAN network, Part 1

February 8, 2019 By John Koon 1 Comment

Providing end-to-end security is the ultimate security goal of every wireless network. Each reported successful cyber attack serves as a reminder that achieving security is easier said than done. Let’s first examine the process.

Most of us know about using strong passwords and encryption. The most vulnerable security component is key management during device activation and authentication. As with physical properties, if you hold the key to the front door, you can get in. The same concept applies to IoT applications. It’s vital to manage the keys to ensure no intruders have access to your key copying or rekeying it. A smart city may have 20,000 smart street lights (end devices) that need to be connected to the server (controller) for the first time. And connecting 20,000 end devices through a process called device activation and authentication is no trivial task.

Simply put, authentication is a process to ensure “You are who you say you are.” A device can easily present an ID that looks real to the server. But is it? If a fake ID is accepted, the whole network is compromised and hackers can steal data information without the knowledge of the end device owners.

cybersecurity
Figure 1: The LoRaWAN block diagram shows how end devices (left) connect to the network servers (right) via gateway hosts (middle). (Image courtesy of LoRa Alliance)

How LoRaWAN network provides end-to-end security

A long-range wide area network, commonly known as LoRaWAN, is an open, standards-based and fast-growing network platform. In just a few years, it has grown from a few network providers to 100 worldwide. Like most long-range networks such as Sigfox and NB-IoT, LoRaWAN connects devices and gateways to servers. It is capable of bi-directional communication with end-to-end security, while some applications or networks only offer unidirectional communication. Typically, these low-power networks (LPWA) including Sigfox, NB-IoT, LoRaWAN, and others support devices with 5-10 years of battery life, making LPWA solutions very attractive to developers. The broad-based applications include smart homes, smart grids, infrastructure, smart farming, industrial IoT, smart cities and smart manufacturing (also known as Industry 4.0).

As shown in Figure 1, the blocks on the left represent end devices, which can be sensors or edge devices. In the middle are blocks representing a gateway and on the right, the blocks represent customer owned application servers or network servers owned by network providers. These servers may be located remotely. Other terms used by LoRaWAN include an application server, network server, and joint server.

  • An application server hosts the application software, which controls or communicates with the end devices.
  • A network server is owned and used by a network provider to forward data traffic between the application server and the end devices.
  • A joint server is an independent server owned by a third party other than the network provider. (Sometimes, the join server can be an independent server owned by the same network service provider.) This is used to keep the root key. Some users prefer this method to increase network security. With the key kept by the joint server, even though the network provider’s platform is hacked, the user’s information is secure because the hacker does not have access to the key kept outside the network provider’s domain.

In part 2 of the series, we will go over how authentication works to achieve end-to-end network security between the end devices and the application servers.

You may also like:

  • LoRaWAN cybersecurity
    Cybersecurity basics: Authentication and “key” management in LoRaWAN, Part 2

  • Better security for automotive 8-port Ethernet gigabit capacity switch
  • Micron 2100
    Secure NOR flash memory to accelerate and authenticate edge intelligence
  • Akida Neuromorphic SoC
    Neuromorphic SoC brings AI to the edge and enterprise
  • CoreGuard
    Security technology to be integrated into next-generation embedded processors
  • pi and thermostat
    How Mr. Robot hacked the IoT

Filed Under: FAQ, Featured Tagged With: basics, FAQ

Reader Interactions

Trackbacks

  1. Who is winning the LPWAN race? Part 2 says:
    June 11, 2020 at 7:09 pm

    […] designing a new LPWAN network, security requirement is very important. Security experts have always warned that cyberattacks are on the rise and will only get worse. […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

DesignFast

Component Selection Made Simple.

Try it Today
design fast globle

EE Training Center Classrooms

“ee

“ee

“ee

“ee

“ee

Subscribe to our Newsletter

Subscribe to weekly industry news, new product innovations and more.

Subscribe today

RSS Current EDABoard.com discussions

  • How to standalone test of an AC breaker motor part
  • Measuring room temperature & temperature regulator with 8051 microcontroller using lm35 temperature sensor
  • Receiver circuit, what does Q4 do?
  • Asynchronous Motor Control
  • Force sensing resistor (FSR) nonlinearity?

RSS Current Electro-Tech-Online.com Discussions

  • Multiple UART Hub to USB?
  • Searching for obsolete Techtools QW-1 quickwriter
  • Tesla coil progress
  • Question wifi and bluetooth erase data discs and flash memory?
  • Does anyone have a paper tape punch for sale, to suit 1" tape?

Follow us on Twitter

Tweets by MicroContrlTips

Footer

Microcontroller Tips

EE World Online Network

  • DesignFast
  • EE World Online
  • EDA Board Forums
  • Electro Tech Online Forums
  • Connector Tips
  • Analog IC Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • Wire and Cable Tips
  • 5G Technology World

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us
Follow us on TwitterAdd us on FacebookFollow us on YouTube Follow us on Instagram

Copyright © 2021 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy