{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:49:23Z","timestamp":1775627363797,"version":"3.50.1"},"reference-count":57,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T00:00:00Z","timestamp":1652400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Dongil Cultural Scholarship Foundation for Academic Research"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Over the years, several proposals on protocol specifications have addressed various challenges in LoRaWAN, focusing on its architecture and security issues. All of these specifications must coexist, giving rise to the compatibility issues impacting the sustainability of this technology. This paper studies the compatibility issues in LoRaWAN protocols. First, we detail the different protocol specifications already disclosed by the LoRa Alliance in two major versions, v1.0 and v1.1. This is done through presenting two scenarios where we discuss the communication and security mechanisms. In the first scenario, we describe how an end node (ED) and network server (NS) implementing LoRaWAN v1.0 generate session security keys and exchange messages for v1.0. In the second scenario, we describe how an ED v1.1 and an NS v1.1 communicate after generating security session keys. Next, we highlight the compatibility issues between the components implementing the two different LoRaWAN Specifications (mainly v1.0 and v1.1). Next, we present two new scenarios (scenarios 3 and 4) interchanging the ED and NS versions. In scenario three, we detail how an ED implementing LoRaWAN v1.1 communicates with an NS v1.0. Conversely, in scenario four, we explain how an ED v1.0 and an NS v1.1 communicate. In all these four scenarios, we highlight the concerns with security mechanism: show security session keys are generated and how integrity and confidentiality are guaranteed in LoRaWAN. At the end, we present a comparative table of these four compatibility scenarios.<\/jats:p>","DOI":"10.3390\/s22103717","type":"journal-article","created":{"date-parts":[[2022,5,15]],"date-time":"2022-05-15T09:48:22Z","timestamp":1652608102000},"page":"3717","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6674-100X","authenticated-orcid":false,"given":"Slim","family":"Loukil","sequence":"first","affiliation":[{"name":"Higher Institute of Business Administration, University of Sfax, Sfax 3018, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0401-5050","authenticated-orcid":false,"given":"Lamia Chaari","family":"Fourati","sequence":"additional","affiliation":[{"name":"ISIMS & SM@RTS\/CRNS (Laboratory of Signals, systeMs, aRtificial Intelligence and neTworkS), Sfax 3018, Tunisia"}]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[{"name":"Graduate School, Faculty of Information Technology, Duy Tan University, Da Nang 550000, Vietnam"}]},{"given":"K.-W.-A.","family":"Chee","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Korea"},{"name":"School of Electronics Engineering, College of IT Engineering, Kyungpook National University, Daegu 41566, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,13]]},"reference":[{"key":"ref_1","unstructured":"(2021, August 15). Ericsson Mobility Report: IoT Connections Outlook. Available online: https:\/\/www.ericsson.com\/en\/reports-and-papers\/mobility-report\/dataforecasts\/iot-connections-outlook."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"133995","DOI":"10.1109\/ACCESS.2020.3010896","article-title":"6G and Beyond: The Future of Wireless Communications Systems","volume":"8","author":"Akyildiz","year":"2020","journal-title":"IEEE Access"},{"key":"ref_3","unstructured":"(2021, August 10). LoRaWAN Specifications. Available online: https:\/\/lora-alliance.org\/about-lorawan\/."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Lonzetta, A.M., Cope, P., Campbell, J., Mohd, B.J., and Hayajneh, T. (2018). Security vulnerabilities in Bluetooth technology as used in IoT. J. Sens. Actuator Netw., 7.","DOI":"10.3390\/jsan7030028"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Raza, S., Misra, P., He, Z., and Voigt, T. (2015, January 19\u201321). Bluetooth smart: An enabling technology for the Internet of Things. Proceedings of the 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/WiMOB.2015.7347955"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Aggarwal, R., and Das, M. (2012, January 17\u201319). RFID security in the context of \u201cinternet of things\u201d. Proceedings of the First International Conference on Security of Internet of Things, Kerala, India.","DOI":"10.1145\/2490428.2490435"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Khoo, B. (2011, January 19\u201322). RFID as an Enabler of the Internet of Things: Issues of Security and Privacy. Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Dalian, China.","DOI":"10.1109\/iThings\/CPSCom.2011.83"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ramya, C.M., Shanmugaraj, M., and Prabakaran, R. (2011, January 8\u201310). Study on ZigBee technology. Proceedings of the 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, India.","DOI":"10.1109\/ICECTECH.2011.5942102"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sruthy, S., and George, S.N. (2017, January 8\u201310). WiFi enabled home security surveillance system using Raspberry Pi and IoT module. Proceedings of the 2017 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), Kollam, India.","DOI":"10.1109\/SPICES.2017.8091320"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Nair, K.K., Abu-Mahfouz, A.M., and Lefophane, S. (2019, January 6\u20138). Analysis of the narrow band internet of things (NB-IoT) technology. Proceedings of the 2019 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa.","DOI":"10.1109\/ICTAS.2019.8703630"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Pitu, F., and Gaitan, N.C. (2020, January 21\u201323). Surveillance of SigFox technology integrated with environmental monitoring. Proceedings of the 2020 International Conference on Development and Application Systems (DAS), Suceava, Romania.","DOI":"10.1109\/DAS49615.2020.9108957"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1007\/s11277-019-06832-x","article-title":"Novel enhanced LoRaWAN framework for smart home remote control security","volume":"110","author":"Naoui","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.comnet.2018.11.017","article-title":"Formal security analysis of LoRaWAN","volume":"148","author":"Eldefrawy","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Butun, I., Pereira, N., and Gidlund, M. (2019). Security risk analysis of LoRaWAN and future directions. Future Internet, 1.","DOI":"10.3390\/fi11010003"},{"key":"ref_15","unstructured":"Seller, O.B., and Sornin, N. (2016). Low Power Long Range Transmitter. (No. 9,252,834), U.S. Patent."},{"key":"ref_16","unstructured":"Sforza, F. (2013). Communications System. (No. 8,406,275), U.S. Patent."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.3390\/s16091466","article-title":"A study of LoRa: Long range & low power networks for the internet of things","volume":"16","author":"Augustin","year":"2016","journal-title":"Sensors"},{"key":"ref_18","unstructured":"LoRa Alliance Technical Committee (2021). RP002-1.0.3 LoRaWAN Regional Parameters, LoRa Alliance Technical Committee. Tech. rep. Version: RP002-1.0.3."},{"key":"ref_19","unstructured":"LoRa Alliance Technical Committee (2015). LoRaWAN Specification, LoRa Alliance Technical Committee. Tech. rep. Version 1.0."},{"key":"ref_20","unstructured":"LoRa Alliance Technical Committee (2016). LoRaWAN Specification, LoRa Alliance Technical Committee. Tech. rep. Version 1.0.1."},{"key":"ref_21","unstructured":"LoRa Alliance Technical Committee (2016). LoRaWAN Specification, LoRa Alliance Technical Committee. Tech. rep. Version 1.0.2."},{"key":"ref_22","unstructured":"LoRa Alliance Technical Committee (2018). LoRaWAN Specification, LoRa Alliance Technical Committee. Tech. rep. Version 1.0.3."},{"key":"ref_23","unstructured":"LoRa Alliance Technical Committee (2017). LoRaWAN Specification, LoRa Alliance Technical Committee. Tech. rep. Version 1.1."},{"key":"ref_24","unstructured":"LoRa Alliance Technical Committee (2020). LoRaWAN Specification, LoRa Alliance Technical Committee. Tech. rep. Version 1.0.4."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"100303","DOI":"10.1016\/j.iot.2020.100303","article-title":"LoRaWAN security survey: Issues, threats and possible mitigation techniques","volume":"12","author":"Noura","year":"2020","journal-title":"Internet Things"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOM.2017.1600613","article-title":"Understanding the limits of LoRaWAN","volume":"55","author":"Adelantado","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bankov, D., Khorov, E., and Lyakhov, A. (2016, January 29\u201330). On the limits of LoRaWAN channel access. Proceedings of the 2016 International Conference on Engineering and Telecommunication (EnT), Moscow, Russia.","DOI":"10.1109\/EnT.2016.011"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Le, D.T., Dinh, T.D., Kirichek, R., Filin, E., and Shestakov, A. (2021, January 25\u201327). A Combined Attack Scenario to Exploit the Join Procedure of LoRaWAN. Proceedings of the 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Brno, Czech Republic.","DOI":"10.1109\/ICUMT54235.2021.9631602"},{"key":"ref_29","unstructured":"Zulian, S. (2021, June 03). Security Threat Analysis and Countermeasures for LoRaWAN Join Procedure. Available online: https:\/\/thesis.unipd.it\/bitstream\/20.500.12608\/27531\/1\/zulian_simone_tesi.pdf."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Fan, C.I., Zhuang, E.S., Karati, A., and Su, C.H. (2022). A Multiple End-Devices Authentication Scheme for LoRaWAN. Electronics, 11.","DOI":"10.3390\/electronics11050797"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Van Es, E., Vranken, H., and Hommersom, A. (2018, January 27\u201330). Denial-of-service attacks on LoRaWAN. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany.","DOI":"10.1145\/3230833.3232804"},{"key":"ref_32","unstructured":"Na, S., Hwang, D., Shin, W., and Kim, K.H. (2017, January 11\u201313). Scenario and countermeasure for replay attack using join request messages in LoRaWAN. Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Nang, Vietnam."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Kim, J., and Song, J. (2017, January 24\u201326). A simple and efficient replay attack prevention scheme for LoRaWAN. Proceedings of the 2017 the 7th International Conference on Communication and Network Security, Tokyo, Japan.","DOI":"10.1145\/3163058.3163064"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"152351","DOI":"10.1109\/ACCESS.2020.3016937","article-title":"Security and privacy in the industrial internet of things: Current standards and future challenges","volume":"8","author":"Gebremichael","year":"2020","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/COMST.2019.2949598","article-title":"A survey on lora networking: Research problems, current solutions, and open issues","volume":"22","author":"Sundaram","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lalle, Y., Fourati, L.C., Fourati, M., and Barraca, J.P. (2019, January 18\u201320). A comparative study of lorawan, sigfox, and nb-iot for smart water grid. Proceedings of the 2019 Global Information Infrastructure and Networking Symposium (GIIS), Paris, France.","DOI":"10.1109\/GIIS48668.2019.9044961"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Lalle, Y., Fourati, L.C., Fourati, M., and Barraca, J.P. (2020, January 20\u201322). LoRaWAN Network Capacity Analysis for Smart Water Grid. Proceedings of the 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal.","DOI":"10.1109\/CSNDSP49049.2020.9249623"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kuntke, F., Romanenko, V., Linsner, S., Steinbrink, E., and Reuter, C. (2022). LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios. Trans. Emerg. Telecommun. Technol., e4452.","DOI":"10.1002\/ett.4452"},{"key":"ref_39","unstructured":"de Moraes, P., and da Concei\u00e7\u00e3o, A.F. (2021). A Systematic Review of Security in the LoRaWAN Network Protocol. arXiv."},{"key":"ref_40","unstructured":"Hessel, F. (2021). LoRaWAN Security Analysis: An Experimental Evaluation of Attacks. [Master\u2019s Thesis, Technische Universit\u00e4t Darmstadt]."},{"key":"ref_41","unstructured":"Claverie, T., and Esteves, J.L. (2021, January 20\u201324). A LoRaWAN Security Assessment Test Bench. Proceedings of the GNU Radio Conference, Charlotte, NC, USA."},{"key":"ref_42","unstructured":"(2003). Telecommunications and Internet Protocol Harmonization over Networks (TIPHON) Release 4; Protocol Framework Definition; Methods and Protocols for Security; part 1: Threat Analysis. Technical Specification (Standard No. 102 024-3 v4. 1.1)."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Butun, I., Pereira, N., and Gidlund, M. (2018, January 25). Analysis of LoRaWAN v1.1 security. Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, Los Angeles, CA, USA.","DOI":"10.1145\/3213299.3213304"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Haxhibeqiri, J., De Poorter, E., Moerman, I., and Hoebeke, J. (2018). A survey of LoRaWAN for IoT: From technology to application. Sensors, 18.","DOI":"10.3390\/s18113995"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Yang, X., Karampatzakis, E., Doerr, C., and Kuipers, F. (2018, January 17\u201320). Security vulnerabilities in LoRaWAN. Proceedings of the 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, FL, USA.","DOI":"10.1109\/IoTDI.2018.00022"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Jalowiczor, J., Rozhon, J., and Voznak, M. (2021). Study of the Efficiency of Fog Computing in an Optimized LoRaWAN Cloud Architecture. Sensors, 21.","DOI":"10.3390\/s21093159"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Aljumah, A., and Ahanger, T.A. (2018, January 8\u201312). Fog computing and security issues: A review. Proceedings of the 2018 7th International Conference on Computers Communications and Control (ICCCC), Oradea, Romania.","DOI":"10.1109\/ICCCC.2018.8390464"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MIC.2017.37","article-title":"Fog computing for the internet of things: Security and privacy issues","volume":"21","author":"Alrawais","year":"2017","journal-title":"IEEE Internet Comput."},{"key":"ref_49","unstructured":"(2011). IEEE Standard for Local and Metropolitan Area Networks\u2014Part 15.4: Low-Rate Wireless Personal area Networks (LR-WPANS) (Standard No. IEEE Std. 802)."},{"key":"ref_50","unstructured":"Song, J., Poovendran, R., Lee, J., and Iwata, T. (2022, March 23). The Aes-cmac Algorithm. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc4493."},{"key":"ref_51","unstructured":"Sornin, N., and Yegin, A. (2022, March 23). LoRaWAN Backend Interfaces 1.0 Specification. Lora Alliance Standard Specification. Available online: https:\/\/lora-alliance.org\/wp-content\/uploads\/2020\/11\/lorawantm-backend-interfaces-v1.0.pdf."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Jouhari, M., Amhoud, E.M., Saeed, N., and Alouini, M.S. (2022). A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges. arXiv.","DOI":"10.1109\/COMST.2023.3274934"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Almuhaya, M.A., Jabbar, W.A., Sulaiman, N., and Abdulmalek, S. (2022). A Survey on LoRaWAN Technology: Recent Trends, Opportunities, Simulation Tools and Future Directions. Electronics, 11.","DOI":"10.3390\/electronics11010164"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"49477","DOI":"10.1109\/ACCESS.2020.2974879","article-title":"Energy-saving measurement in LoRaWAN-based wireless sensor networks by using compressed sensing","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/TGCN.2019.2908409","article-title":"Collision resolution protocol for delay and energy efficient LoRa networks","volume":"3","author":"Guitton","year":"2019","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/JIOT.2019.2949918","article-title":"$ free $\u2014Fine-grained scheduling for reliable and energy-efficient data collection in lorawan","volume":"7","author":"Abdelfadeel","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"2694","DOI":"10.1109\/JIOT.2020.3019140","article-title":"Batteryless LoRaWAN communications using energy harvesting: Modeling and characterization","volume":"8","author":"Delgado","year":"2020","journal-title":"IEEE Internet Things J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/10\/3717\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:10:16Z","timestamp":1760137816000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/10\/3717"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,13]]},"references-count":57,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["s22103717"],"URL":"https:\/\/doi.org\/10.3390\/s22103717","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,13]]}}}