{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T09:51:54Z","timestamp":1769507514156,"version":"3.49.0"},"reference-count":29,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T00:00:00Z","timestamp":1574380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["No.61872262,61572349"],"award-info":[{"award-number":["No.61872262,61572349"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specification and the limited consumption performance of devices to carry out security attacks such as replay attacks. In the process of the over-the-air-activation (OTAA) for LoRa nodes, attackers can modify the data because the data is transmitted in plain text. If the user\u2019s root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network. To solve this security flaw in LoRaWAN, we propose a countermeasure called Secure-Packet-Transmission scheme (SPT) which works based on the LoRaWAN standard v1.1 to prevent replay attacks when an attacker has obtained the root key. The proposed scheme redefines the format of join-request packet, add the new One Time Password (OTP) encrypted method and changes the transmission strategy in OTAA between LoRa nodes and network server. The security evaluation by using the Burrows-Abadi-Needham logic (BAN Logic) and the Scyther shows that the security goal can be achieved. This paper also conducts extensive experiments by simulations and a testbed to perform feasibility and performance analysis. All results demonstrate that SPT is lightweight, efficient and able to defend against malicious behavior.<\/jats:p>","DOI":"10.3390\/s19235122","type":"journal-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T09:18:10Z","timestamp":1574414290000},"page":"5122","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7848-7803","authenticated-orcid":false,"given":"Shu-Yang","family":"Gao","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin 300350, China"},{"name":"Tianjin Key Laboratory of Advanced Networking, Tianjin 300350, China"}]},{"given":"Xiao-Hong","family":"Li","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin 300350, China"},{"name":"Tianjin Key Laboratory of Advanced Networking, Tianjin 300350, China"}]},{"given":"Mao-De","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore"}]}],"member":"1968","published-online":{"date-parts":[[2019,11,22]]},"reference":[{"key":"ref_1","unstructured":"LoRa Alliance Technical Committee (2016). LoRaWAN\u2122 Specification Version 1.0.2, LoRa Alliance Technical Committee."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Basford, P.J., Johnston, S.J., Apetroaie-Cristea, M., Bulot, F.M.J., and Cox, S.J. (2019, January 17\u201321). LoRaWAN for City Scale IoT Deployments. Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark.","DOI":"10.1109\/GIOTS.2019.8766359"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I., Steri, G., and Baldini, G. (2017, January 22\u201326). Security and Privacy Issues for an IoT Based Smart Home. Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tomasin, S., Zulian, S., and Vangelista, L. (2017, January 19\u201322). Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks. Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, San Francisco, CA, USA.","DOI":"10.1109\/WCNCW.2017.7919091"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"45325","DOI":"10.1109\/ACCESS.2018.2852563","article-title":"An AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments","volume":"6","author":"Tsai","year":"2018","journal-title":"IEEE Access"},{"key":"ref_6","unstructured":"Miller, R. (2016). LoRa Security\u2014Building a Secure LoRa Solution, MWR Labs."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.E., and Saidane, L.A. (2016, January 22\u201325). Enhancing the security of the IoT LoraWAN architecture. Proceedings of the 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), Paris, France.","DOI":"10.1109\/PEMWN.2016.7842904"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"6590713","DOI":"10.1155\/2017\/6590713","article-title":"A dual key-based activation scheme for secure LoRaWAN","volume":"2017","author":"Kim","year":"2017","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"ref_9","unstructured":"(2017, October 10). OWASP Serverless Top 10 Project. Available online: https:\/\/www.owasp.org\/index.php."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Slabicki, M., Premsankar, G., and Di Francesco, M. (2018, January 23\u201327). Adaptive Configuration of Lora Networks for Dense IoT Deployments. Proceedings of the 2018 IEEE\/IFIP Network Operations and Management Symposium, NOMS, Taipei, Taiwan.","DOI":"10.1109\/NOMS.2018.8406255"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2018.02.010","article-title":"One-time password based on hash chain without shared secret and re-registration","volume":"75","author":"Park","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_12","unstructured":"LoRa Alliance Technical Committee (2017). LoRaWAN\u2122 Specification Version 1.1, LoRa Alliance Technical Committee."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Benkahla, N., Tounsi, H., Ye-Qiong, S.O.N.G., and Frikha, M. (2019, January 24\u201328). Enhanced ADR for LoRaWAN networks with mobility. Proceedings of the 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC), Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766738"},{"key":"ref_14","unstructured":"(2019, August 25). The Scyther Tool Overview. Available online: https:\/\/people.cispa.io\/cas.cremers\/scyther\/index.html."},{"key":"ref_15","unstructured":"(2019, August 28). Scyther-Manual. Available online: https:\/\/people.cispa.io\/cas.cremers\/downloads\/scyther\/scyther-w32-v1.1.3.zip."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.comnet.2018.11.017","article-title":"Formal security analysis of LoRaWAN","volume":"148","author":"Eldefrawy","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_17","unstructured":"(2019, August 28). Semtech SX1276 Tools. Available online: https:\/\/www.semtech.com\/products\/wireless-rf\/lora-transceivers\/SX1276."},{"key":"ref_18","unstructured":"(2019, October 08). How to Set Up the DHT11 Humidity Sensor on an Arduino. Available online: http:\/\/www.circuitbasics.com\/how-to-set-up-the-dht11-humidity-sensor-on-an-arduino."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1109\/TNET.2019.2907243","article-title":"Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks","volume":"27","author":"Qiu","year":"2019","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.future.2015.09.003","article-title":"A risk analysis of a smart home automation system","volume":"56","author":"Jacobsson","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Jacobsson, A., and Davidsson, P. (2015, January 14\u201316). Towards a Model of Privacy and Security for Smart Homes. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy.","DOI":"10.1109\/WF-IoT.2015.7389144"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Aras, E., Ramachandran, G.S., Lawrence, P., and Hughes, D. (2017, January 21\u201323). Exploring the Security Vulnerabilities of LoRa. Proceedings of the IEEE International Conference on Cybernet, Exeter, UK.","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Kim, J., and Song, J. (2017, January 24\u201326). A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN. Proceedings of the 7th International Conference on Communication and Network Security, Tokyo, Japan.","DOI":"10.1145\/3163058.3163064"},{"key":"ref_24","unstructured":"Na, S., Hwang, D., Shin, W., and Kim, K.H. (2017, January 11\u201313). Scenario and countermeasure for replay attack using join request messages in LoRaWAN. Proceedings of the International Conference on Information Networking, Da Nang, Vietnam."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.procs.2018.07.202","article-title":"Security of Join Procedure and its Delegation in LoRaWAN v1.1","volume":"134","author":"Tashsin","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Yang, X., Karampatzakis, E., Doerr, C., and Kuipers, F. (2018, January 17\u201320). Security Vulnerabilities in LoRaWAN. Proceedings of the IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation(IoTDI), Orlando, FL, USA.","DOI":"10.1109\/IoTDI.2018.00022"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"8682","DOI":"10.1109\/TVT.2018.2841348","article-title":"TMED: A spider web-like transmission mechanism for emergency data in vehicular ad hoc networks","volume":"67","author":"Qiu","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Bouguera, T., Diouris, J.F., Chaillout, J.J., and Jaouadi, R. (2018). Energy Consumption Model for Sensor Nodes Based on LoRa and LoRaWAN. Sensors, 18.","DOI":"10.3390\/s18072104"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sanchez-Iborra, R., S\u00e1nchez-G\u00f3mez, J., P\u00e9rez, S., Fern\u00e1ndez, P., Santa, J., Hern\u00e1ndez-Ramos, J., and Skarmeta, A. (2018). Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach. Sensors, 18.","DOI":"10.3390\/s18061833"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/23\/5122\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:36:50Z","timestamp":1760189810000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/23\/5122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,22]]},"references-count":29,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["s19235122"],"URL":"https:\/\/doi.org\/10.3390\/s19235122","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,22]]}}}