Naoui, S., Elhdhili, M. E., and Saidane, L. A. (2016). En-
hancing the security of the iot lorawan architecture. In
Performance Evaluation and Modeling in Wired and
Wireless Networks (PEMWN), International Confer-
ence on, pages 1–7. IEEE.
Noura, H., Chehab, A., and Couturier, R. (2019a).
Lightweight dynamic key-dependent and flexible ci-
pher scheme for iot devices. In 2019 IEEE Wire-
less Communications and Networking Conference
(WCNC), pages 1–8. IEEE.
Noura, H. N., Melki, R., Chehab, A., and Mansour, M. M.
(2018). A physical encryption scheme for low-power
wireless m2m devices: a dynamic key approach. Mo-
bile Networks and Applications, pages 1–17.
Noura, H. N., Melki, R., Chehab, A., and Mansour, M. M.
(2019b). A physical encryption scheme for low-power
wireless m2m devices: a dynamic key approach. Mo-
bile Networks and Applications, 24(2):447–463.
Noura, H. N., Melki, R., Malli, M., and Chehab, A. (2019c).
Design and realization of efficient & secure multi-
homed systems based on random linear network cod-
ing. Computer Networks, 163:106886.
Ruotsalainen, H. and Grebeniuk, S. (2018). Towards wire-
less secret key agreement with lora physical layer.
In Proceedings of the 13th International Conference
on Availability, Reliability and Security, ARES 2018,
pages 23:1–23:6, New York, NY, USA. ACM.
Salinesi, C., Mazo, R., Djebbi, O., Diaz, D., and Lora-
Michiels, A. (2011). Constraints: The core of product
line engineering. In Research Challenges in Informa-
tion Science (RCIS), 2011 Fifth International Confer-
ence on, pages 1–10. IEEE.
Salman, O., Elhajj, I., Chehab, A., and Kayssi, A. (2018).
Iot survey: An sdn and fog computing perspective.
Computer Networks, 143:221 – 246.
Salman, O., Elhajj, I., Kayssi, A., and Chehab, A. (2015).
Edge computing enabling the internet of things. In
2015 IEEE 2nd World Forum on Internet of Things
(WF-IoT), pages 603–608. IEEE.
Salman, O., Kayssi, A., Chehab, A., and Elhajj, I. (2017).
Multi-level security for the 5g/iot ubiquitous network.
In 2017 Second International Conference on Fog and
Mobile Edge Computing (FMEC), pages 188–193.
IEEE.
Sanchez-Iborra, R., S
´
anchez-G
´
omez, J., P
´
erez, S.,
Fern
´
andez, P. J., Santa, J., Hern
´
andez-Ramos, J. L.,
and Skarmeta, A. F. (2018). Enhancing lorawan secu-
rity through a lightweight and authenticated key man-
agement approach. Sensors, 18(6).
Sisinni, E., Carvalho, D. F., Ferrari, P., Flammini, A., Silva,
D. R. C., and Da Silva, I. M. (2018). Enhanced flex-
ible lorawan node for industrial iot. In 2018 14th
IEEE International Workshop on Factory Communi-
cation Systems (WFCS), pages 1–4. IEEE.
Sung, W., Ahn, H., Kim, J., and Choi, S. (2018). Protect-
ing end-device from replay attack on lorawan. In 2018
20th International Conference on Advanced Commu-
nication Technology (ICACT), pages 167–171.
Tomasin, S., Zulian, S., and Vangelista, L. (2017). Se-
curity analysis of lorawan join procedure for internet
of things networks. In Wireless Communications and
Networking Conference Workshops (WCNCW), 2017
IEEE, pages 1–6. IEEE.
Tsai, K.-L., Huang, Y.-L., Leu, F.-Y., You, I., Huang, Y.-
L., and Tsai, C.-H. (2018). Aes-128 based secure low
power communication for lorawan iot environments.
IEEE Access, 6:45325–45334.
Vangelista, L., Zanella, A., and Zorzi, M. (2015). Long-
range iot technologies: The dawn of lora™ . In
Atanasovski, V. and Leon-Garcia, A., editors, Future
Access Enablers for Ubiquitous and Intelligent Infras-
tructures, pages 51–58, Cham. Springer International
Publishing.
Verma, S., Kawamoto, Y., Fadlullah, Z. M., Nishiyama, H.,
and Kato, N. (2017). A survey on network method-
ologies for real-time analytics of massive iot data and
open research issues. IEEE Communications Surveys
& Tutorials, 19(3):1457–1477.
Xia, Z., Zhou, H., Gu, K., Yin, B., Zeng, Y., and Xu, M.
(2018). Secure session key management scheme for
meter-reading system based on lora technology. IEEE
Access, 6:75015–75024.
Xu, W., Jha, S., and Hu, W. (2018). Exploring the feasibility
of physical layer key generation for lorawan. In 2018
17th IEEE International Conference On Trust, Secu-
rity And Privacy In Computing And Communications/
12th IEEE International Conference On Big Data Sci-
ence And Engineering (TrustCom/BigDataSE), pages
231–236.
Xu, W., Jha, S., and Hu, W. (2019). Lora-key: Secure key
generation system for lora-based network. IEEE In-
ternet of Things Journal, pages 1–1.
Yang, X., Karampatzakis, E., Doerr, C., and Kuipers,
F. (2018). Security vulnerabilities in lorawan.
In 2018 IEEE/ACM Third International Conference
on Internet-of-Things Design and Implementation
(IoTDI), pages 129–140. IEEE.
Zhang, J., Marshall, A., and Hanzo, L. (2018). Channel-
envelope differencing eliminates secret key correla-
tion: Lora-based key generation in low power wide
area networks. IEEE Transactions on Vehicular Tech-
nology, 67(12):12462–12466.
Towards Securing LoRaWAN ABP Communication System
447