The International Arab Journal of Information Technology (IAJIT)


LoRaWAN Energy Optimization with Security Consideration

Long Range Wide Area Network (LoRaWAN) is an emerging wireless technology that is expected to be widely deployed and implemented in several applications, especially with the promising widespread use of the Internet of Things (IoT) and its potential applications within the Fifth Generation (5G) communication technology. LoRaWAN consists of a number of nodes that monitors and senses the environment to collect specific data, and then sends the collected data to a remote monitoring device for further processing and decision-making. Energy consumption and security assurance are two vital factors needed to be optimized to ensure an efficient and reliable network operation and performance. To achieve that, each of LoRaWAN nodes can be configured by five transmission parameters, which are the spreading factor, carrier frequency, bandwidth, coding rate and transmission power. Choosing the best values of these parameters leads to enhancing the network deployment. In this paper, we shed the light to the security aspect in LoRaWAN network. Then, we introduced an algorithm that depends on the reinforcement learning approach to enable each node in the network to choose the best values of spreading factor and transmission power such that it leads to a lower energy consumption and higher packets’ delivery rate. The results of the simulation experiments of our proposed technique showed a valuable increase in the packet reception rate at the gateway and a significant decrease in the total consumed energy at the end nodes compared with the most related work in literature.

[1] Bor M., Roedig U., Voigt T., and Alonso J., “Do LoRa Low-Power Wide-Area Networks Scale,” in Proceedings of the 19th International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Malta, pp. 59-67, 2016.

[2] Bor M., “LoRaSim Simulator Based on SimPy for Simulating Collisions in LoRa Networks and to Analyses Calability,” .html, Last Visited, 2021.

[3] Bor M. and Roedig U., “LoRa Transmission Parameter Selection,” in Proceedings of the 13th International Conference on Distributed Computing in Sensor Systems, pp. 27-34, 2017.

[4] Claverie T. and Lopes-Esteves J., “A LoRaWAN Security Assessment Testbench,” in Proceeding of the GNU Radio Conference, vol. 2, no. 1, 2021.

[5] Darabkh K., Kassab W., and Khalifeh A., “Lim- AHP-G-C: Life Time Maximizing Based on Analytical Hierarchal Process and Genetic Clustering Protocol for the Internet of Things Environment,” Computer Networks, 176, 2020.

[6] De Almeida I, Mendes L., Rodrigues J., and Cruz M., “5G Waveforms for IoT Applications,” IEEE Communications Surveys and Tutorials, vol. 2, no. 3, pp. 2554-2567, 2019.

[7] Duc-Tuyen Ta., “LoRaWAN-ML Network Simulator with Reinforcement Learning-Based Algorithms,” ml, Last Visited, 2021.

[8] Goudos S., Dallas P., Chatziefthymiou S., and Kyriazakos S., “A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications,” Wireless Personal Communications, vol. 97, no. 2, pp. 1645-1675, 2017.

[9] Houhamdi, Z. and Athamena B., “Identity Identification and Management in the Internet of Things,” The International Arab Journal of Information Technology, vol. 17, no. 4A, pp. 645- 654, 2020.

[10] Jovanovic U., Jovanovic I., Petrusic Z., and Mancic D., “Low-Cost Wireless Soil Moisture Monitoring System,” Facta Universitatis, Series: Working and Living Environmental Protection, aol. 11, no. 2, pp. 87-95, 2015.

[11] Khalifeh A., Abid H., and Darabkh K., “Improving Energy Conservation Level in WSNs by Modifying CH Node Location,” in Proceedings of the Accepted for Publication at the 6th International Workshop on Internet of Things: Networking Applications and Technologies, Paris, pp. 20-23, 2020.

[12] Khalifeh A., Abid H., and Darabkh K., “Optimal Cluster Head Positioning Algorithm for Wireless Sensor Networks,” Sensors, vol. 20, no. 13, 1-26, 2020.

[13] Khalifeh A., Aldahdouh K., and Alouneh S., “Optimizing the Energy Consumption Level in LoRaWAN Energy Optimization with Security Consideration 483 LoRaWan Networks,” in Proceedings of 21st International Arab Conference on Information Technology , 6th of October city, pp. 1-6, 2020.

[14] Khutsoane O., Isong B., and Abu-Mahfouz A., “IoT Devices and Applications Based on Lora/Lorawan,” in Proceedings of The 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, pp. 6107-6112, 2017.

[15] Mekki K., Bajic E., Chaxel F., and Meyer F., “Overview of Cellular LPWAN Technologies for IoT Deployment: Sigfox, LoRaWAN, and NB- IoT,” in Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops, Athens, pp. 197- 202, 2018.

[16] Mitra R. and Agrawal D., “5G Mobile Technology: A Survey,” ICT Express, vol. 1, no. 3, pp. 132-137, 2015.

[17] Noura H., Hatoum T., Salman O., Yaacoub J, and Chehab A., “LoRaWAN Security Survey: Issues, Threats and Possible Mitigation Techniques,” Internet of Things, vol. 12, 2020.

[18] Ochoa M., Guizar A., Maman M., and Duda A., “Evaluating LoRa Energy Efficiency for Adaptive Networks: From Star to Mesh Topologies,” in Proceedings of the 13th International Conference on Wireless and Mobile Computing, Networking and Communications, Rome, pp. 1-8, 2017.

[19] Palaniswami S. and Rajaram A., “An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad Hoc Networks,” The International Arab Journal of Information Technology, vol. 9, no. 3, pp. 291-298, 2012.

[20] Petajajarvi J., Mikhaylov K., Roivainen A., Hanninen T., and Pettissalo M., “On the Coverage of LPWAN: Range Evaluation and Channel Attenuation Model for LoRa Technology,” in the Proceedings of 14th International Conference on ITS Telecommunications, Copenhagen, pp. 55-59, 2015.

[21] Sinha R., Wei Y., and Hwang S., “A Survey on LPWA Technology: LoRa and NB-IoT” ICT Express, vol. 3, no. 1, pp. 14-21, 2017.

[22] Ta D., Khawam K., Lahoud S., Adjih C., and Martin S., “LoRa-MAB: A Flexible Simulator for Decentralized Learning Resource Allocation in IoT Networks,” in Proceedings of 12th IFIP Wireless and Mobile Networking Conference, Paris, pp. 55-62, 2019.

[23] To T. and Duda A., “Simulation of LoRa in Ns-3: Improving LoRa Performance with CSMA,” in Proceedings of The International Conference on Communications, Kansas City, pp. 1-7, 2018.

[24] Voigt T., Bor M., and Alonso J., “Mitigating Inter- network Interference in LoRa networks,” arXiv preprint arXiv:1611.00688, 2016.

[25] Yang X., Karampatzakis E., Doerr C., and Kuipers F., “Security Vulnerabilities in LoRaWAN,” in Proceedings of IEEE International Conference on Internet-of-Things Design and Implementation, Orlando, pp. 129-140, 2018.

[26] Zhou Q., Zheng K., Xing J., and Xu R., “Design and Implementation of Open LoRa for IoT,” IEEE Access, vol. 7, pp. 100649-100657, 2019. Ala’ Khalifeh received the PhD degree in Electrical and Computer Engineering from the University of California, Irvine -USA in 2010. He is currently an Associate Professor in the Communication Engineering department at the German Jordanian University and the department chair. His research is in communications technology, and networking with particular emphasis on optimal resource allocations for multimedia transmission over wired and wireless networks, Quality of Service, Internet of Things and Wireless Sensor Networks. Khaled Aldahdouh is a researcher in the Communication Engineering department at the German Jordanian University. He received the MSc degree in the Computer Engineering from the German Jordanian University in 2020, and the BA degree in the communication engineering from Philadelphia University in Jordan in 2017. His research is in wireless communications, 5G system, Internet of Things, and Wireless Sensor Networks based on LoRa technology. Sahel Alouneh is a full professor of electrical and computer engineering. Currently, he is a member of the Cybersecurity program in Engineering College, Al Ain University, Abu Dhabi campus, in the UAE. His posts before joining Al Ain University, Prof. Alouneh held the post of the dean of Scientific Research at German Jordanian University (GJU) from October 2019 to August 2020. In addition, he served as the dean of the faculty of electrical engineering and information technology at the German Jordanian University (GJU) from September 2015 and September 2019. Prof. Alouneh also served as the vice dean of the deanship of graduate studies and scientific research at GJU from March 2014 to March 2015. He also served as the director of computer center at GJU from July 2009 to January 2012.