
7 CONSIDERATIONS AND
FUTURE WORK
The IIoT is a relatively well-established concept. Sev-
eral standardization lead to a well-defined architec-
ture following the standards bodies such as ISO,
NIST, and IIC. Thus, recommendations on security
and identity lifecycle guide the definition of objec-
tives. The characterization is in accordance with the
main regulatory institutions of the international mar-
ket in the field of Industrial Internet. The path neces-
sary to achieve the goal of analyzing the lifecycle of
LoRaWAN credentials provided by ChirpStack. With
the approach of joining and activation procedures in
LoRaWAN, the steps and phases of the credential life-
cycle were related to the protocol credentials. This
intersectionality is an important characteristic of the
contribution of this work. The most concrete impor-
tance of this work was to avoid information security
incidents in industries due to vulnerabilities in the
lifecycle of credentials.
It was possible to state that the LoRaWAN pri-
vate networks provided by ChirpStack needs to be
improved to secure credentials during its lifecycle.
There are disparities between the recommended and
implemented lifecycle, mainly in auditing. Addition-
ally, this environment does not fully implement rec-
ommended lifecycle steps such as credential rotation
and revocation. Thus, it allows the work to serve as
a basis for deploying technologies such as LoRaWAN
in a risk-conscious manner or that the implementation
can provide the points at which this computational ar-
rangement falls short regarding the credentials lifecy-
cle.
Furthermore, this work points to future work. A
more comprehensive and updated bibliographic sur-
vey in terms of IIoT could be carried out, as it con-
tributes to the concept of IIoT. Another future work
that comes naturally from this work would be to im-
prove ChirpStack for a fully lifecycle-compliant cre-
dential lifecycle. Implementations aimed at tracking
lifecycle operations are vital. Another future work is
fix security problems such as storing clear credentials
stored in the database used by ChirpStack.
ACKNOWLEDGMENTS
This work was funding by the National Council for
Scientific and Technological Development (CNPq,
grant 311245/2021-8), FAPESC, UDESC, and devel-
oped at LabP2D.
REFERENCES
Brown, G. et al. (2018). Ultra-reliable low-latency 5g
for industrial automation. Technol. Rep. Qualcomm,
2:52065394.
De Sousa, P. H. F., Navar de Medeiros, M., Almeida, J. S.,
Reboucas Filho, P. P., de Albuquerque, V. H. C., et al.
(2019). Intelligent incipient fault detection in wind
turbines based on industrial iot environment. Journal
of Artificial Intelligence and Systems, 1(1):1–19.
D
¨
onmez, T. C. and Nigussie, E. (2018). Security of lo-
rawan v1.1 in backward compatibility scenarios. Pro-
cedia Computer Science, 134:51–58. The 15th Inter-
national Conference on Mobile Systems and Pervasive
Computing (MobiSPC 2018) / The 13th International
Conference on Future Networks and Communications
(FNC-2018) / Affiliated Workshops.
e Margaret Lech e Liuping Wang, X. C. (2021). A complete
key management scheme for lorawan v1.1 †. Sensors
(Basel, Switzerland), 21.
Felli, L. and Giuliano, R. (2021). Access control in wood-
land through blockchain and lorawan. In 2021 AEIT
International Conference on Electrical and Electronic
Technologies for Automotive (AEIT AUTOMOTIVE),
pages 1–5.
Galv
˜
ao, T. F., Pansani, T. d. S. A., and Harrad, D. (2015).
Principais itens para relatar revis
˜
oes sistem
´
aticas e
meta-an
´
alises: A recomendac¸
˜
ao prisma. Epidemiolo-
gia e servic¸os de sa
´
ude, 24:335–342.
Gulati, K., Boddu, R. S. K., Kapila, D., Bangare, S. L.,
Chandnani, N., and Saravanan, G. (2022). A review
paper on wireless sensor network techniques in inter-
net of things (iot). Materials Today: Proceedings,
51:161–165.
Kim, H. and Lee, E. A. (2017). Authentication and au-
thorization for the internet of things. IT Professional,
19(5):27–33.
Kobara, K. (2016). Cyber physical security for industrial
control systems and iot. IEICE TRANSACTIONS on
Information and Systems, 99(4):787–795.
Lin, S.-W., Miller, B., Durand, J., Bleakley, G., Chigani, A.,
Martin, R., and Crawford, B. M. M. (2017). Indus-
trial internet consortium (iic) - the industrial internet
of things volume g1: Reference architecture.
Lund, F. (2022). Study of lorawan device and gateway se-
tups: with chirpstack implementation.
Luvisotto, M., Tramarin, F., Vangelista, L., and Vitturi, S.
(2018). On the use of lorawan for indoor industrial iot
applications. Wireless Communications and Mobile
Computing, 2018.
McPherson, R. and Irvine, J. (2020). Secure decentralised
deployment of lorawan sensors. IEEE Sensors Jour-
nal, 21(1):725–732.
Naoui, S., Elhdhili, M. E., and Saidane, L. A. (2016). En-
hancing the security of the iot lorawan architecture. In
2016 International Conference on Performance Eval-
uation and Modeling in Wired and Wireless Networks
(PEMWN), pages 1–7. IEEE.
Naoui, S., Elhdhili, M. E., and Saidane, L. A. (2017).
Trusted third party based key management for enhanc-
IoTBDS 2024 - 9th International Conference on Internet of Things, Big Data and Security
164