[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks

Published: 23 February 2024 Publication History

Abstract

The widespread deployment of unattended LoRa networks poses a growing need to perform Firmware Updates Over-The-Air (FUOTA). However, the FUOTA specifications dedicated by LoRa Alliance fall short of several deficiencies with respect to energy efficiency, transmission reliability, multicast fairness, and security. This article proposes FLoRa+, energy-efficient, reliable, beamforming-assisted, and secure FUOTA for LoRa networks, which is featured with several techniques, including delta scripting, channel coding, beamforming, and securing mechanisms. Specifically, we first propose a joint differencing and compression algorithm to generate the delta script for processing gain, which unlocks the potential of incremental FUOTA in LoRa networks. Then, we design a concatenated channel coding scheme with outer rateless code and inner error detection to enable reliable transmission for coding gain. Afterward, we develop a beamforming strategy to avoid biased multicast and compromised throughput for power gain. Finally, we present a securing mechanism incorporating progressive hash chain and packet arrival time pattern verification to countermeasure firmware integrity and availability attacks for security gain. Experimental results on a 20-node testbed demonstrate that FLoRa+ improves transmission reliability and energy efficiency by up to 1.51× and 2.65× compared with LoRaWAN. Additionally, FLoRa+ can defend against 100% and 85.4% of spoofing and Denial-of-Service (DoS) attacks.

References

[1]
Khaled Abdelfadeel, Tom Farrell, David McDonald, and Dirk Pesch. 2020. How to make firmware updates over LoRaWAN possible. In IEEE WoWMoM.
[2]
Frederic Amiel, Karine Villegas, Benoit Feix, and Louis Marcel. 2007. Passive and active combined attacks: Combining fault attacks and side channel analysis. In IEEE FDTC Workshop.
[3]
A. Anastasiou, Panayiotis Christodoulou, Klitos Christodoulou, Vasos Vassiliou, and Zinon Zinonos. 2020. IoT device firmware update over LoRa: The blockchain solution. In IEEE DCOSS.
[4]
Konstantinos Arakadakis, Pavlos Charalampidis, Antonis Makrogiannakis, and Alexandros Fragkiadakis. 2021. Firmware over-the-air programming techniques for IoT networks—A survey. ACM CComput. Surv. 54, 9 (2021), 1–36.
[5]
Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, and Christian Winnerlein. 2013. BLAKE2: Simpler, smaller, fast as MD5. In Springer ACNS.
[6]
Artur Balanuta, Nuno Pereira, Swarun Kumar, and Anthony Rowe. 2020. A cloud-optimized link layer for low-power wide-area networks. In ACM MobiSys.
[7]
Atul Bansal, Akshay Gadre, Vaibhav Singh, Anthony Rowe, Bob Iannucci, and Swarun Kumar. 2021. OwLL: Accurate LoRa localization using the TV whitespaces. In ACM/IEEE IPSN.
[8]
Mihir Bellare and Tadayoshi Kohno. 2004. Hash function balance and its impact on birthday attacks. In Springer EUROCRYPT.
[9]
Julien Catalano. 2021. LoRaWAN firmware update over-the-air (FUOTA). J. ICT Stand. (2021), 21–34.
[10]
Andreas Crauser and Paolo Ferragina. 2002. A theoretical and experimental study on the construction of suffix arrays in external memory. Algorithmica 32 (2022), 1–35.
[11]
Zhuangzhuang Dai, Muhamad Risqi U. Saputra, Chris Xiaoxuan Lu, Vu Tran, L. N. S. Wijayasingha, M. Arif Rahman, John A. Stankovic, Andrew Markham, and Niki Trigoni. 2022. Deep odometry systems on edge with EKF-LoRa backend for real-time indoor positioning. In IEEE CPS-ER Workshop.
[12]
Wei Dong, Biyuan Mo, Chao Huang, Yunhao Liu, and Chun Chen. 2013. R3: Optimizing relocatable code for efficient reprogramming in networked embedded systems. In IEEE INFOCOM.
[13]
Prabal K. Dutta, Jonathan W. Hui, David C. Chu, and David E. Culler. 2006. Securing the deluge network programming system. In ACM/IEEE IPSN.
[14]
Amalinda Gamage, Jansen Christian Liando, Chaojie Gu, Rui Tan, and Mo Li. 2020. Lmac: Efficient carrier-sense multiple access for LoRa. In ACM MobiCom.
[15]
Weifeng Gao, Wan Du, Zhiwei Zhao, Geyong Min, and Mukesh Singhal. 2019. Towards energy-fairness in LoRa networks. In IEEE ICDCS.
[16]
Everette S. Gardner Jr. 1985. Exponential smoothing: The state of the art. Int. J. Forecast. 4, 1 (1985), 1–28.
[17]
Chaojie Gu, Linshan Jiang, Rui Tan, Mo Li, and Jun Huang. 2021. Attack-aware synchronization-free data timestamping in LoRaWAN. ACM Trans. Sensor Netw. 18, 1 (2021), 1–31.
[18]
Chaojie Gu, Rui Tan, and Xin Lou. 2019. One-hop out-of-band control planes for multi-hop wireless sensor networks. ACM Trans. Sensor Netw. 15, 4 (2019), 1–29.
[19]
Xiuzhen Guo, Longfei Shangguan, Yuan He, Nan Jing, Jiacheng Zhang, Haotian Jiang, and Yunhao Liu. 2022. Saiyan: Design and implementation of a low-power demodulator for LoRa backscatter systems. In USENIX NSDI.
[20]
Xiuzhen Guo, Longfei Shangguan, Yuan He, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, and Yunhao Liu. 2020. Aloba: Rethinking ON-OFF keying modulation for ambient LoRa backscatter. In ACM SenSys.
[21]
Han Han, Yihong Liu, and Lei Zhang. 2020. On half-power beamwidth of intelligent reflecting surface. IEEE Commun. Lett. 25, 4 (2020), 1333–1337.
[22]
Derek Heeger, Maeve Garigan, Eirini Eleni Tsiropoulou, and Jim Plusquellic. 2021. Secure LoRa firmware update with adaptive data rate techniques. Sensors 21, 7 (2021), 2384.
[23]
Ningning Hou, Xianjin Xia, and Yuanqing Zheng. 2021. Jamming of LoRa PHY and countermeasure. In IEEE INFOCOM.
[24]
Jonathan W. Hui and David Culler. 2004. The dynamic behavior of a data dissemination protocol for network programming at scale. In ACM SenSys.
[25]
Sangwon Hyun, Peng Ning, An Liu, and Wenliang Du. 2008. Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks. In ACM/IEEE IPSN.
[26]
Jinyan Jiang, Jiliang Wang, Yijie Chen, Yihao Liu, and Yunhao Liu. 2023. LocRa: Enable practical long-range backscatter localization for low-cost tags. In ACM MobiSys.
[27]
Juha Kärkkäinen and Peter Sanders. 2003. Simple linear work suffix array construction. In ICALP.
[28]
Naoto Kimura and Shahram Latifi. 2005. A survey on data compression in wireless sensor networks. In IEEE ITCC.
[29]
Shajahan Kutty and Debarati Sen. 2015. Beamforming for millimeter wave communications: An inclusive survey. IEEE Commun. Surv. Tutor. 18, 2 (2015), 949–973.
[30]
Patrick E. Lanigan, Rajeev Gandhi, and Priya Narasimhan. 2006. Sluice: Secure dissemination of code updates in sensor networks. In IEEE ICDCS.
[31]
David Lecompte and Frédéric Gabin. 2012. Evolved multimedia broadcast/multicast service (eMBMS) in LTE-advanced: Overview and Rel-11 enhancements. IEEE Commun. Mag. 50, 11 (2012), 68–74.
[32]
Philip Levis, Neil Patel, David Culler, and Scott Shenker. 2004. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In USENIX NSDI.
[33]
Chenning Li, Hanqing Guo, Shuai Tong, Xiao Zeng, Zhichao Cao, Mi Zhang, Qiben Yan, Li Xiao, Jiliang Wang, and Yunhao Liu. 2021. NELoRa: Towards ultra-low SNR LoRa communication with neural-enhanced demodulation. In ACM SenSys.
[34]
Chenning Li, Xiuzhen Guo, Longfei Shangguan, Zhichao Cao, and Kyle Jamieson. 2022. CurvingLoRa to boost LoRa network throughput via concurrent transmission. In USENIX NSDI.
[35]
Jansen C. Liando, Amalinda Gamage, Agustinus W. Tengourtius, and Mo Li. 2019. Known and unknown facts of LoRa: Experiences from a large-scale measurement study. ACM Trans. Sensor Netw. 15, 2 (2019), 1–35.
[36]
Jun Liu, Jiayao Gao, Sanjay Jha, and Wen Hu. 2021. Seirios: Leveraging multiple channels for LoRaWAN indoor and outdoor localization. In ACM MobiCom.
[37]
Michael Luby. 2002. LT codes. In IEEE FOCS.
[38]
Paul J. Marcelis, Vijay Rao, and R. Venkatesha Prasad. 2017. DaRe: Data recovery through application layer coding for LoRaWAN. In IoTDI. 97–108.
[39]
Biyuan Mo, Wei Dong, Chun Chen, Jiajun Bu, and Qiang Wang. 2012. An efficient differencing algorithm based on suffix array for reprogramming wireless sensor networks. In IEEE ICC.
[40]
Fionn Murtagh and Pedro Contreras. 2012. Algorithms for hierarchical clustering: An overview. Wiley Interdiscip. Rev.: Data Min. Knowl. Discov. 2, 1 (2012), 86–97.
[41]
Tao Ni, Yongliang Chen, Weitao Xu, Lei Xue, and Qingchuan Zhao. 2023. XPorter: A study of the multi-port charger security on privacy leakage and voice injection. In ACM MobiCom.
[42]
Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, and Weitao Xu. 2023. Eavesdropping mobile app activity via radio-frequency energy harvesting. In USENIX Security.
[43]
Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023. Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning. In ACM MobiCom.
[44]
Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023. Uncovering user interactions on smartphones via contactless wireless charging side channels. In IEEE S&P.
[45]
Yao Peng, Longfei Shangguan, Yue Hu, Yujie Qian, Xianshang Lin, Xiaojiang Chen, Dingyi Fang, and Kyle Jamieson. 2018. PLoRa: A passive long-range data network from ambient LoRa transmissions. In ACM SIGCOMM.
[46]
Simon J. Puglisi, William F. Smyth, and Andrew H. Turpin. 2007. A taxonomy of suffix array construction algorithms. ACM Comput Surv. 39, 2 (2007), 4–es.
[47]
Yidong Ren, Li Liu, Chenning Li, Zhichao Cao, and Shigang Chen. 2022. Is LoRaWAN really wide? Fine-grained LoRa link-level measurement in an urban environment. In IEEE ICNP.
[48]
Mark Shand and Jean Vuillemin. 1993. Fast implementations of RSA cryptography. In IEEE ARITH.
[49]
Cheng Shen, Tian Liu, Jun Huang, and Rui Tan. 2021. When LoRa meets EMR: Electromagnetic covert channels can be super resilient. In IEEE S&P.
[50]
Monsoon Solutions. 2021. High Voltage Power Monitor: Monsoon solutions: Bellevue. Retrieved from: https://www.msoon.com/high-voltage-power-monitor
[51]
Yin Sun, C. Emre Koksal, Kyu-Han Kim, and Ness B. Shroff. 2014. Scheduling of multicast and unicast services under limited feedback by using rateless codes. In IEEE INFOCOM.
[52]
Zehua Sun, Tao Ni, Huanqi Yang, Kai Liu, Yu Zhang, Tao Gu, and Weitao Xu. 2023. FLoRa: Energy-efficient, reliable, and beamforming-assisted over-the-air firmware update in LoRa networks. In ACM/IEEE IPSN.
[53]
Zehua Sun, Huanqi Yang, Kai Liu, Zhimeng Yin, Zhenjiang Li, and Weitao Xu. 2022. Recent advances in LoRa: A comprehensive survey. ACM Trans. Sensor Netw. 18, 4 (2022), 1–44.
[54]
Shuai Tong, Zhenqiang Xu, and Jiliang Wang. 2020. CoLoRa: Enabling multi-packet reception in LoRa. In IEEE INFOCOM.
[55]
Andrew Tridgell. 1999. Efficient algorithms for sorting and synchronization. (1999).
[56]
Xiong Wang, Linghe Kong, Zucheng Wu, Long Cheng, Chenren Xu, and Guihai Chen. 2020. SLoRa: Towards secure LoRa communications with fine-grained physical layer features. In ACM SenSys.
[57]
Jack Wolf. 1978. Efficient maximum likelihood decoding of linear block codes using a trellis. IEEE Trans. Inf. Theor. 24, 1 (1978), 76–80.
[58]
Xianjin Xia, Qianwu Chen, Ningning Hou, and Yuanqing Zheng. 2022. HyLink: Towards high throughput LPWANSs with LoRa compatible communication. In ACM SenSys.
[59]
Xianjin Xia, Qianwu Chen, Ningning Hou, Yuanqing Zheng, and Mo Li. 2023. XCopy: Boosting weak links for reliable LoRa communication. In ACM MobiCom.
[60]
Xianjin Xia, Ningning Hou, Yuanqing Zheng, and Tao Gu. 2021. PCube: Scaling LoRa concurrent transmissions with reception diversities. In ACM MobiCom.
[61]
Xianjin Xia, Yuanqing Zheng, and Tao Gu. 2019. FTrack: Parallel decoding for LoRa transmissions. In ACM SenSys.
[62]
Binbin Xie and Jie Xiong. 2020. Combating interference for long range LoRa sensing. In ACM SenSys.
[63]
Binbin Xie, Yuqing Yin, and Jie Xiong. 2021. Pushing the limits of long range wireless sensing with LoRa. ACM Interact. Mob. Wear. Ubiq. Technol. 5, 3 (2021), 1–21.
[64]
Weitao Xu, Sanjay Jha, and Wen Hu. 2018. LoRa-key: Secure key generation system for LoRa-based network. IEEE Internet Things J. 6, 4 (2018), 6404–6416.
[65]
Ismail Yabanova, Sezai Taskin, Huseyin Ekiz, and Hasan Cimen. 2012. Bootloader design application for embedded systems by using controller area network. Computer Science 1 (2012), 952–957.
[66]
Huanqi Yang, Zehua Sun, Hongbo Liu, Xianjin Xia, Yu Zhang, Tao Gu, Gerhard Hancke, and Weitao Xu. 2023. ChirpKey: A chirp-level information-based key generation scheme for LoRa networks via perturbed compressed sensing. In IEEE INFOCOM.
[67]
Qiang Yang, Kaiyan Cui, and Yuanqing Zheng. 2023. VoShield: Voice liveness detection with sound field dynamics. In IEEE INFOCOM.
[68]
Fusang Zhang, Zhaoxin Chang, Jie Xiong, Rong Zheng, Junqi Ma, Kai Niu, Beihong Jin, and Daqing Zhang. 2021. Unlocking the beamforming potential of LoRa for long-range multi-target respiration sensing. ACM Interact. Mob. Wear. Ubiq. Technol. 5, 2 (2021), 1–25.

Cited By

View all
  • (2024)EarDA: Towards Accurate and Data-Efficient Earable Activity Sensing2024 IEEE Coupling of Sensing & Computing in AIoT Systems (CSCAIoT)10.1109/CSCAIoT62585.2024.00005(1-7)Online publication date: 13-May-2024

Index Terms

  1. FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 20, Issue 3
      May 2024
      634 pages
      EISSN:1550-4867
      DOI:10.1145/3613571
      • Editor:
      • Wen Hu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 23 February 2024
      Online AM: 22 January 2024
      Accepted: 11 January 2024
      Revised: 10 January 2024
      Received: 01 November 2023
      Published in TOSN Volume 20, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. LoRa
      2. firmware update over-the-air

      Qualifiers

      • Research-article

      Funding Sources

      • NSFC
      • Shenzhen Research Institute, City University of Hong Kong
      • Research Grants Council of the Hong Kong Special Administrative Region
      • NSF of Shandong Province
      • Guangdong Province
      • CityU APRC
      • CityU MFPRC
      • CityU SIRG
      • CityU SRG-Fd

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)527
      • Downloads (Last 6 weeks)24
      Reflects downloads up to 24 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)EarDA: Towards Accurate and Data-Efficient Earable Activity Sensing2024 IEEE Coupling of Sensing & Computing in AIoT Systems (CSCAIoT)10.1109/CSCAIoT62585.2024.00005(1-7)Online publication date: 13-May-2024

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media