Publication detail

On Track of Sigfox Confidentiality with End-to-End Encryption

FUJDIAK, R. BLAŽEK, P. MIKHAYLOV, K. MALINA, L. MLÝNEK, P. MIŠUREC, J. BLAŽEK, V.

Original Title

On Track of Sigfox Confidentiality with End-to-End Encryption

English Title

On Track of Sigfox Confidentiality with End-to-End Encryption

Type

conference paper

Language

en

Original Abstract

The last years brought many novel challenges for the Internet of Things (IoT). Low capital and operational expenditures, massive deployments of devices, reliability and security are among the most crucial ones. The recently introduced Low-power wide area (LPWA) technologies provide one possible way of addressing these challenges. In the current paper, we focus on one of the most mature LPWA technology, namely Sigfox. We provide a brief security assessment of this technology and highlight the main security imperfections. Notably, we also consider the recent changes introduced in the last revision of the Sigfox specification released in the fourth quarter of 2017. Importantly, this paper discusses the highlighted issues and compares three selected cryptographic encryption solutions (AES, ChaCha and OTP) in respect to the main IoT triad of performance, security and cost. We investigate the encryption solutions and characterize their energy consumption in a real-life implementation. The results herein presented are useful for understanding the cost of enabling security aspects and enable selecting the most efficient encryption protocol.

English abstract

The last years brought many novel challenges for the Internet of Things (IoT). Low capital and operational expenditures, massive deployments of devices, reliability and security are among the most crucial ones. The recently introduced Low-power wide area (LPWA) technologies provide one possible way of addressing these challenges. In the current paper, we focus on one of the most mature LPWA technology, namely Sigfox. We provide a brief security assessment of this technology and highlight the main security imperfections. Notably, we also consider the recent changes introduced in the last revision of the Sigfox specification released in the fourth quarter of 2017. Importantly, this paper discusses the highlighted issues and compares three selected cryptographic encryption solutions (AES, ChaCha and OTP) in respect to the main IoT triad of performance, security and cost. We investigate the encryption solutions and characterize their energy consumption in a real-life implementation. The results herein presented are useful for understanding the cost of enabling security aspects and enable selecting the most efficient encryption protocol.

Keywords

IoT, LPWAN, Sigfox, Security, Encryption, Symmetric cipher, AES, ChaCha, One time pad, Low-power

Released

27.08.2018

ISBN

978-1-4503-6448-5

Book

Proceedings of the 13th International Conference on Availability, Reliability and Security

Pages from

1

Pages to

6

Pages count

6

BibTex


@inproceedings{BUT149376,
  author="Radek {Fujdiak} and Petr {Blažek} and Lukáš {Malina} and Petr {Mlýnek} and Jiří {Mišurec} and Vojtěch {Blažek}",
  title="On Track of Sigfox Confidentiality with End-to-End Encryption",
  annote="The last years brought many novel challenges for the Internet of Things (IoT). Low capital and operational expenditures, massive deployments of devices, reliability and security are among the most crucial ones. The recently introduced Low-power wide area (LPWA) technologies provide one possible way of addressing these challenges. In the current paper, we focus on one of the most mature LPWA technology, namely Sigfox. We provide a brief security assessment of this technology and highlight the main security imperfections. Notably, we also consider the recent changes introduced in the last revision of the Sigfox specification released in the fourth quarter of 2017. Importantly, this paper discusses the highlighted issues and compares three selected cryptographic encryption solutions (AES, ChaCha and OTP) in respect to the main IoT triad of performance, security and cost. We investigate the encryption solutions and characterize their energy consumption in a real-life implementation. The results herein presented are useful for understanding the cost of enabling security aspects and enable selecting the most efficient encryption protocol.",
  booktitle="Proceedings of the 13th International Conference on Availability, Reliability and Security",
  chapter="149376",
  doi="10.1145/3230833.3232805",
  howpublished="online",
  year="2018",
  month="august",
  pages="1--6",
  type="conference paper"
}