• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Battery Power
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • 5G
    • Automotive/Transportation
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Handbooks
    • EE Training Days
    • Tutorials
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • White Papers
    • Educational Assets
    • Design Guide Library
    • Digital Issues
    • Engineering Diversity & Inclusion
    • LEAP Awards
    • Podcasts
    • DesignFast
  • Videos
    • EE Videos and Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Bill’s Blogs
  • Advertise
  • Subscribe

Cybersecurity basics: Server and end device relationship to LoRaWAN network, Part 1

February 8, 2019 By John Koon Leave a Comment

Providing end-to-end security is the ultimate security goal of every wireless network. Each reported successful cyberattack serves as a reminder that achieving security is easier said than done. Let’s first examine the process.

Most of us know about using strong passwords and encryption. The most vulnerable security component is key management during device activation and authentication. As with physical properties, if you hold the key to the front door, you can get in. The same concept applies to IoT applications. It’s vital to manage the keys to ensure no intruders have access to your key copying or rekeying it. A smart city may have 20,000 smart street lights (end devices) that need to be connected to the server (controller) for the first time. And connecting 20,000 end devices through a process called device activation and authentication is no trivial task.

Simply put, authentication is a process to ensure “You are who you say you are.” A device can easily present an ID that looks real to the server. But is it? If a fake ID is accepted, the whole network is compromised and hackers can steal data information without the knowledge of the end device owners.

cybersecurity

Figure 1: The LoRaWAN block diagram shows how end devices (left) connect to the network servers (right) via gateway hosts (middle). (Image courtesy of LoRa Alliance)

How LoRaWAN network provides end-to-end security

A long-range wide area network, commonly known as LoRaWAN, is an open, standard-based and fast-growing network platform. In just a few years, it has grown from a few network providers to 100 worldwide. Like most long-range networks such as Sigfox and NB-IoT, LoRaWAN connects devices and gateways to servers. It is capable of bi-directional communication with end-to-end security, while some applications or networks only offer unidirectional communication. Typically, these low-power networks (LPWA) including Sigfox, NB-IoT, LoRaWAN, and others support devices with 5-10 years of battery life, making LPWA solutions very attractive to developers. The broad-based applications include smart homes, smart grids, infrastructure, smart farming, industrial IoT, smart cities and smart manufacturing (also known as Industry 4.0).

As shown in Figure 1, the blocks on the left represent end devices, which can be sensors or edge devices. In the middle are blocks representing a gateway and on the right the blocks represent customer owned application servers or network servers owned by network providers. These servers may be located remotely. Other terms used by LoRaWAN include application server, network server, and joint server.

  • An application server hosts the application software, which controls or communicates with the end devices.
  • A network server is owned and used by a network provider to forward data traffic between the application server and the end devices.
  • A joint server is an independent server owned by a third party other than the network provider. (Sometimes, the join server can be an independent server owned by the same network service provider.) This is used to keep the root key. Some users prefer this method to increase network security. With the key kept by the joint server, even though the network provider’s platform is hacked, the user’s information is secure because the hacker does not have access to the key kept outside the network provider’s domain.

In part 2 of the series, we will go over how authentication work to achieve end-to-end network security between the end devices and the application servers.

You Might Also Like

Filed Under: FAQ, Featured, Microcontroller Tips Tagged With: basics, FAQ, loraalliance

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

EE Engineering Training Days

engineering

Featured Contributions

Why outdoor charging demands specialized battery connectors

How Li-ion batteries are powering the shift in off-highway equipment

Integrating MEMS technology into next-gen vehicle safety features

Five challenges for developing next-generation ADAS and autonomous vehicles

Robust design for Variable Frequency Drives and starters

More Featured Contributions

EE Tech Toolbox

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.
“bills
contribute

R&D World Podcasts

R&D 100 Episode 10
See More >

Sponsored Content

Designing for Serviceability: The Role of Interconnects in HVAC Maintenance

From Control Boards to Comfort: How Signal Integrity Drives HVAC Innovation

Built to Withstand: Sealing and Thermal Protection in HVAC Sub-Systems

Revolutionizing Manufacturing with Smart Factories

Smarter HVAC Starts at the Sub-System Level

Empowering aerospace E/E design and innovation through Siemens Xcelerator and Capital in the Cloud

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • Step Up Push Pull Transformer design / construction
  • How to create custom diode and add its netlist into Ansys circuit designer schematic?
  • Two sections broadband impedance matching
  • connector model question
  • LLC converter shoot through currents at start-up

RSS Current Electro-Tech-Online.com Discussions

  • Wierd makita battery
  • More fun with ws2812 this time XC8 and CLC
  • I Wanna build a robot
  • Impact of Tariffs on PCB Fab
  • Earbud wiring w/ mic
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Teardown Videos
  • Advertise with us
  • Contact us
  • About Us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy