{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:27Z","timestamp":1767339927917,"version":"build-2065373602"},"reference-count":37,"publisher":"MDPI AG","issue":"17","license":[{"start":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T00:00:00Z","timestamp":1630281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication, integrity, and encryption using two-session preshared secret keys. However, although the LoRaWAN supports some security functions, it suffers from session key generation and key update problems. This motivates us to introduce a new key management protocol that resolves the LoRaWAN problems and supports key updates. The proposed protocol is based on hash chain generation using a one-way hash function. Network entities share a common hash chain of n key elements to allow using a unique signing key per message. We also propose a salt hashing algorithm that encrypts the original keys into a different form to avoid the physical attacks at the end device side. We analyzed the proposed key generation performance in terms of the computation time, the required storage, and the communication overhead. We implemented and tested the proposed key generation protocol using the NS-3 network simulator. The proposed lightweight key generation protocol significantly enhances the security of the original LoRaWAN at a negligible overhead. The proposed protocol reduces the power consumption and transmission time by two times compared with some previous protocols. In addition, the proposed key generation protocol can resist attacks, such as key compromising attacks and replay attacks, and it supports the Perfect Forward Secrecy, which was not supported by LoRaWAN.<\/jats:p>","DOI":"10.3390\/s21175838","type":"journal-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T22:58:15Z","timestamp":1630450695000},"page":"5838","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-8664","authenticated-orcid":false,"given":"Shimaa A. Abdel","family":"Hakeem","sequence":"first","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"},{"name":"Electronics Research Institute (ERI), El Nozha, Cairo 12622, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5561-2424","authenticated-orcid":false,"given":"Sherine M. Abd","family":"El-Kader","sequence":"additional","affiliation":[{"name":"Electronics Research Institute (ERI), El Nozha, Cairo 12622, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-2075","authenticated-orcid":false,"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2021,8,30]]},"reference":[{"unstructured":"(2021, January 28). Ericsson Mobility Report: On the Pulse of the Networked Society. Available online: http:\/\/www.ericsson.com\/res\/docs\/2015\/mobility-report\/ericsson-mobility-report-nov-2015.pdf.","key":"ref_1"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of things: A survey on enabling technologies, protocols, and applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"crossref","unstructured":"Lavric, A., and Popa, V. (2017, January 13\u201314). Internet of things and LoRa\u2122 low-power wide-area networks: A survey. Proceedings of the 2017 International Symposium on Signals, Circuits and Systems (ISSCS), Lasi, Romania.","key":"ref_3","DOI":"10.1109\/ISSCS.2017.8034915"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.icte.2017.03.004","article-title":"A survey on LPWA technology: LoRa and NB-IoT","volume":"3","author":"Sinha","year":"2017","journal-title":"Ict Express"},{"doi-asserted-by":"crossref","unstructured":"Chaudhari, B.S., Zennaro, M., and Borkar, S. (2020). LPWAN technologies: Emerging application characteristics, requirements, and design considerations. Future Internet, 12.","key":"ref_5","DOI":"10.3390\/fi12030046"},{"doi-asserted-by":"crossref","unstructured":"Foubert, B., and Mitton, N. (2020). Long-range wireless radio technologies: A survey. Future Internet, 12.","key":"ref_6","DOI":"10.3390\/fi12010013"},{"doi-asserted-by":"crossref","unstructured":"Devalal, S., and Karthikeyan, A. (2018, January 29\u201331). LoRa technology-an overview. Proceedings of the 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India.","key":"ref_7","DOI":"10.1109\/ICECA.2018.8474715"},{"doi-asserted-by":"crossref","unstructured":"Hakeem, S.A.A., and Kim, H. (2021). Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X. Sensors, 21.","key":"ref_8","DOI":"10.3390\/s21020665"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"119689","DOI":"10.1109\/ACCESS.2019.2937182","article-title":"A decentralized lightweight authentication and privacy protocol for vehicular networks","volume":"7","author":"Kim","year":"2019","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Hakeem SA, A., El-Gawad MA, A., and Kim, H. (2020). Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. Sensors, 20.","key":"ref_10","DOI":"10.3390\/s20195719"},{"doi-asserted-by":"crossref","unstructured":"Haseeb, K., Almogren, A., Ud Din, I., Islam, N., and Altameem, A. (2020). SASC: Secure and authentication-based sensor cloud architecture for intelligent Internet of Things. Sensors, 20.","key":"ref_11","DOI":"10.3390\/s20092468"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s11235-019-00612-5","article-title":"Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues","volume":"73","author":"Ferrag","year":"2020","journal-title":"Telecommun. Syst."},{"doi-asserted-by":"crossref","unstructured":"Chuang, Y.H., Lo, N.W., Yang, C.Y., and Tang, S.W. (2018). A lightweight continuous authentication protocol for the Internet of Things. Sensors, 18.","key":"ref_13","DOI":"10.3390\/s18041104"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"100312","DOI":"10.1016\/j.cosrev.2020.100312","article-title":"A survey on privacy and security of Internet of Things","volume":"38","author":"Ogonji","year":"2020","journal-title":"Comput. Sci. Rev."},{"doi-asserted-by":"crossref","unstructured":"Aras, E., Ramachandran, G.S., Lawrence, P., and Hughes, D. (2017, January 21\u201323). Exploring the security vulnerabilities of LoRa. Proceedings of the 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, UK.","key":"ref_15","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2948","DOI":"10.1109\/JSYST.2020.3000269","article-title":"A lightweight protocol for secure data provenance in the Internet of Things using wireless fingerprints","volume":"15","author":"Aman","year":"2020","journal-title":"IEEE Syst. J."},{"doi-asserted-by":"crossref","unstructured":"Yegin, A., Kramp, T., Dufour, P., Gupta, R., Soss, R., Hersent, O., Hunt, D., and Sornin, N. (2020). LoRaWAN protocol: Specifications, security, and capabilities. LPWAN Technologies for IoT and M2M Applications, Academic Press.","key":"ref_17","DOI":"10.1016\/B978-0-12-818880-4.00003-X"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., Karampatzakis, E., Doerr, C., and Kuipers, F. (2018, January 17\u201320). Security vulnerabilities in LoRaWAN. Proceedings of the 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, FL, USA.","key":"ref_18","DOI":"10.1109\/IoTDI.2018.00022"},{"doi-asserted-by":"crossref","unstructured":"You, I., Kwon, S., Choudhary, G., Sharma, V., and Seo, J.T. (2018). An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors, 18.","key":"ref_19","DOI":"10.3390\/s18061888"},{"doi-asserted-by":"crossref","unstructured":"Butun, I., Pereira, N., and Gidlund, M. (2018, January 25). Analysis of LoRaWAN v1. 1 security. Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, Los Angeles, CA, USA.","key":"ref_20","DOI":"10.1145\/3213299.3213304"},{"unstructured":"Zulian, S. (2021, June 28). Security Threat Analysis and Countermeasures for Lorawan Join Procedure. Available online: http:\/\/tesi.cab.unipd.it\/53210\/.","key":"ref_21"},{"doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.E., and Saidane, L.A. (2016, January 22\u201325). Enhancing the security of the IoT LoraWAN architecture. Proceedings of the 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), Paris, France.","key":"ref_22","DOI":"10.1109\/PEMWN.2016.7842904"},{"unstructured":"Girard, P. (2021, July 28). Low Power Widw Area Networks Security. Available online: https:\/\/docbox.etsi.org\/Workshop\/2015\/201512_M2MWORKSHOP\/S04_WirelessTechnoforIoTandSecurityChallenges\/GEMALTO_GIRARD.pdf.","key":"ref_23"},{"unstructured":"Sornin, N., Luis, M., Eirich, T., Kramp, T., and Hersent, O. (2021, May 20). LoRaWAN Specification V1.0.2, LoRa Alliance. Available online: https:\/\/lora-alliance.org\/resource_hub\/lorawan-specification-v1-0-2\/.","key":"ref_24"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.comnet.2018.11.017","article-title":"Formal security analysis of LoRaWAN","volume":"148","author":"Eldefrawy","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"6590713","DOI":"10.1155\/2017\/6590713","article-title":"A dual key-based activation scheme for secure LoRaWAN","volume":"2017","author":"Kim","year":"2017","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Krawczyk, H. (2011). Perfect forward secrecy. Encyclopedia of Cryptography and Security, Springer.","key":"ref_28","DOI":"10.1007\/978-1-4419-5906-5_90"},{"unstructured":"Von Oheimb, D. (2005, January 12\u201315). The high-level protocol specification language HLPSL developed in the EU project AVISPA. Proceedings of the APPSEM 2005 Workshop, Frauenchiemsee, Germany.","key":"ref_29"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","article-title":"Automated security protocol analysis with the AVISPA tool","volume":"155","author":"Vigano","year":"2006","journal-title":"Electron. Notes Theor. Comput. Sci."},{"unstructured":"miracl\/MIRACL (2021, July 28). June 2018. Available online: https:\/\/github.com\/miracl\/MIRACL.","key":"ref_31"},{"unstructured":"(2021, June 15). NS-3.29 NS-3: ns3::MinstrelHt WiFi Manager Class Reference. March 2019. Available online: https:\/\/www.nsnam.org\/releases\/ns-3-29\/.","key":"ref_32"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"6730719","DOI":"10.1155\/2018\/6730719","article-title":"Performance evaluation of LoRaWAN communication scalability in large-scale wireless sensor networks","volume":"2018","author":"Lavric","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"unstructured":"LoRaEnergy Calculator (2021, May 17). Lora Energy Calculator. Available online: https:\/\/dramco.be\/tools\/lora-calculator\/.","key":"ref_34"},{"doi-asserted-by":"crossref","unstructured":"Vangelista, L., and Cattapan, A. (2019, January 11\u201313). A new lora-compatible modulation improving the lorawan network level performance. Proceedings of the 2019 IEEE Latin-American Conference on Communications (LATINCOM), Salvador, Brazil.","key":"ref_35","DOI":"10.1109\/LATINCOM48065.2019.8937880"},{"key":"ref_36","first-page":"1","article-title":"Current and future developments to improve 5G-NewRadio performance in vehicle-to everything communications","volume":"75","author":"Hakeem","year":"2020","journal-title":"Telecommun. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"6015","DOI":"10.1007\/s11276-020-02419-8","article-title":"5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing","volume":"26","author":"Hakeem","year":"2020","journal-title":"Wirel. Netw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/17\/5838\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:55:51Z","timestamp":1760165751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/17\/5838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,30]]},"references-count":37,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2021,9]]}},"alternative-id":["s21175838"],"URL":"https:\/\/doi.org\/10.3390\/s21175838","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,8,30]]}}}