skip to main content
research-article

FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks

Authors Info & Claims
Published:23 February 2024Publication History
Skip Abstract Section

Abstract

The widespread deployment of unattended LoRa networks poses a growing need to perform Firmware Updates Over-The-Air (FUOTA). However, the FUOTA specifications dedicated by LoRa Alliance fall short of several deficiencies with respect to energy efficiency, transmission reliability, multicast fairness, and security. This article proposes FLoRa+, energy-efficient, reliable, beamforming-assisted, and secure FUOTA for LoRa networks, which is featured with several techniques, including delta scripting, channel coding, beamforming, and securing mechanisms. Specifically, we first propose a joint differencing and compression algorithm to generate the delta script for processing gain, which unlocks the potential of incremental FUOTA in LoRa networks. Then, we design a concatenated channel coding scheme with outer rateless code and inner error detection to enable reliable transmission for coding gain. Afterward, we develop a beamforming strategy to avoid biased multicast and compromised throughput for power gain. Finally, we present a securing mechanism incorporating progressive hash chain and packet arrival time pattern verification to countermeasure firmware integrity and availability attacks for security gain. Experimental results on a 20-node testbed demonstrate that FLoRa+ improves transmission reliability and energy efficiency by up to 1.51× and 2.65× compared with LoRaWAN. Additionally, FLoRa+ can defend against 100% and 85.4% of spoofing and Denial-of-Service (DoS) attacks.

REFERENCES

  1. [1] Abdelfadeel Khaled, Farrell Tom, McDonald David, and Pesch Dirk. 2020. How to make firmware updates over LoRaWAN possible. In IEEE WoWMoM.Google ScholarGoogle Scholar
  2. [2] Amiel Frederic, Villegas Karine, Feix Benoit, and Marcel Louis. 2007. Passive and active combined attacks: Combining fault attacks and side channel analysis. In IEEE FDTC Workshop.Google ScholarGoogle Scholar
  3. [3] Anastasiou A., Christodoulou Panayiotis, Christodoulou Klitos, Vassiliou Vasos, and Zinonos Zinon. 2020. IoT device firmware update over LoRa: The blockchain solution. In IEEE DCOSS.Google ScholarGoogle Scholar
  4. [4] Arakadakis Konstantinos, Charalampidis Pavlos, Makrogiannakis Antonis, and Fragkiadakis Alexandros. 2021. Firmware over-the-air programming techniques for IoT networks—A survey. ACM CComput. Surv. 54, 9 (2021), 1–36.Google ScholarGoogle Scholar
  5. [5] Aumasson Jean-Philippe, Neves Samuel, Wilcox-O’Hearn Zooko, and Winnerlein Christian. 2013. BLAKE2: Simpler, smaller, fast as MD5. In Springer ACNS.Google ScholarGoogle Scholar
  6. [6] Balanuta Artur, Pereira Nuno, Kumar Swarun, and Rowe Anthony. 2020. A cloud-optimized link layer for low-power wide-area networks. In ACM MobiSys.Google ScholarGoogle Scholar
  7. [7] Bansal Atul, Gadre Akshay, Singh Vaibhav, Rowe Anthony, Iannucci Bob, and Kumar Swarun. 2021. OwLL: Accurate LoRa localization using the TV whitespaces. In ACM/IEEE IPSN.Google ScholarGoogle Scholar
  8. [8] Bellare Mihir and Kohno Tadayoshi. 2004. Hash function balance and its impact on birthday attacks. In Springer EUROCRYPT.Google ScholarGoogle Scholar
  9. [9] Catalano Julien. 2021. LoRaWAN firmware update over-the-air (FUOTA). J. ICT Stand. (2021), 21–34.Google ScholarGoogle Scholar
  10. [10] Crauser Andreas and Ferragina Paolo. 2002. A theoretical and experimental study on the construction of suffix arrays in external memory. Algorithmica 32 (2022), 1–35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Dai Zhuangzhuang, Saputra Muhamad Risqi U., Lu Chris Xiaoxuan, Tran Vu, Wijayasingha L. N. S., Rahman M. Arif, Stankovic John A., Markham Andrew, and Trigoni Niki. 2022. Deep odometry systems on edge with EKF-LoRa backend for real-time indoor positioning. In IEEE CPS-ER Workshop.Google ScholarGoogle Scholar
  12. [12] Dong Wei, Mo Biyuan, Huang Chao, Liu Yunhao, and Chen Chun. 2013. R3: Optimizing relocatable code for efficient reprogramming in networked embedded systems. In IEEE INFOCOM.Google ScholarGoogle Scholar
  13. [13] Dutta Prabal K., Hui Jonathan W., Chu David C., and Culler David E.. 2006. Securing the deluge network programming system. In ACM/IEEE IPSN.Google ScholarGoogle Scholar
  14. [14] Gamage Amalinda, Liando Jansen Christian, Gu Chaojie, Tan Rui, and Li Mo. 2020. Lmac: Efficient carrier-sense multiple access for LoRa. In ACM MobiCom.Google ScholarGoogle Scholar
  15. [15] Gao Weifeng, Du Wan, Zhao Zhiwei, Min Geyong, and Singhal Mukesh. 2019. Towards energy-fairness in LoRa networks. In IEEE ICDCS.Google ScholarGoogle Scholar
  16. [16] Jr Everette S. Gardner. 1985. Exponential smoothing: The state of the art. Int. J. Forecast. 4, 1 (1985), 1–28.Google ScholarGoogle Scholar
  17. [17] Gu Chaojie, Jiang Linshan, Tan Rui, Li Mo, and Huang Jun. 2021. Attack-aware synchronization-free data timestamping in LoRaWAN. ACM Trans. Sensor Netw. 18, 1 (2021), 1–31.Google ScholarGoogle Scholar
  18. [18] Gu Chaojie, Tan Rui, and Lou Xin. 2019. One-hop out-of-band control planes for multi-hop wireless sensor networks. ACM Trans. Sensor Netw. 15, 4 (2019), 1–29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Guo Xiuzhen, Shangguan Longfei, He Yuan, Jing Nan, Zhang Jiacheng, Jiang Haotian, and Liu Yunhao. 2022. Saiyan: Design and implementation of a low-power demodulator for LoRa backscatter systems. In USENIX NSDI.Google ScholarGoogle Scholar
  20. [20] Guo Xiuzhen, Shangguan Longfei, He Yuan, Zhang Jia, Jiang Haotian, Siddiqi Awais Ahmad, and Liu Yunhao. 2020. Aloba: Rethinking ON-OFF keying modulation for ambient LoRa backscatter. In ACM SenSys.Google ScholarGoogle Scholar
  21. [21] Han Han, Liu Yihong, and Zhang Lei. 2020. On half-power beamwidth of intelligent reflecting surface. IEEE Commun. Lett. 25, 4 (2020), 1333–1337.Google ScholarGoogle Scholar
  22. [22] Heeger Derek, Garigan Maeve, Tsiropoulou Eirini Eleni, and Plusquellic Jim. 2021. Secure LoRa firmware update with adaptive data rate techniques. Sensors 21, 7 (2021), 2384.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Hou Ningning, Xia Xianjin, and Zheng Yuanqing. 2021. Jamming of LoRa PHY and countermeasure. In IEEE INFOCOM.Google ScholarGoogle Scholar
  24. [24] Hui Jonathan W. and Culler David. 2004. The dynamic behavior of a data dissemination protocol for network programming at scale. In ACM SenSys.Google ScholarGoogle Scholar
  25. [25] Hyun Sangwon, Ning Peng, Liu An, and Du Wenliang. 2008. Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks. In ACM/IEEE IPSN.Google ScholarGoogle Scholar
  26. [26] Jiang Jinyan, Wang Jiliang, Chen Yijie, Liu Yihao, and Liu Yunhao. 2023. LocRa: Enable practical long-range backscatter localization for low-cost tags. In ACM MobiSys.Google ScholarGoogle Scholar
  27. [27] Kärkkäinen Juha and Sanders Peter. 2003. Simple linear work suffix array construction. In ICALP.Google ScholarGoogle Scholar
  28. [28] Kimura Naoto and Latifi Shahram. 2005. A survey on data compression in wireless sensor networks. In IEEE ITCC.Google ScholarGoogle Scholar
  29. [29] Kutty Shajahan and Sen Debarati. 2015. Beamforming for millimeter wave communications: An inclusive survey. IEEE Commun. Surv. Tutor. 18, 2 (2015), 949–973.Google ScholarGoogle Scholar
  30. [30] Lanigan Patrick E., Gandhi Rajeev, and Narasimhan Priya. 2006. Sluice: Secure dissemination of code updates in sensor networks. In IEEE ICDCS.Google ScholarGoogle Scholar
  31. [31] Lecompte David and Gabin Frédéric. 2012. Evolved multimedia broadcast/multicast service (eMBMS) in LTE-advanced: Overview and Rel-11 enhancements. IEEE Commun. Mag. 50, 11 (2012), 68–74.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Levis Philip, Patel Neil, Culler David, and Shenker Scott. 2004. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In USENIX NSDI.Google ScholarGoogle Scholar
  33. [33] Li Chenning, Guo Hanqing, Tong Shuai, Zeng Xiao, Cao Zhichao, Zhang Mi, Yan Qiben, Xiao Li, Wang Jiliang, and Liu Yunhao. 2021. NELoRa: Towards ultra-low SNR LoRa communication with neural-enhanced demodulation. In ACM SenSys.Google ScholarGoogle Scholar
  34. [34] Li Chenning, Guo Xiuzhen, Shangguan Longfei, Cao Zhichao, and Jamieson Kyle. 2022. CurvingLoRa to boost LoRa network throughput via concurrent transmission. In USENIX NSDI.Google ScholarGoogle Scholar
  35. [35] Liando Jansen C., Gamage Amalinda, Tengourtius Agustinus W., and Li Mo. 2019. Known and unknown facts of LoRa: Experiences from a large-scale measurement study. ACM Trans. Sensor Netw. 15, 2 (2019), 1–35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Liu Jun, Gao Jiayao, Jha Sanjay, and Hu Wen. 2021. Seirios: Leveraging multiple channels for LoRaWAN indoor and outdoor localization. In ACM MobiCom.Google ScholarGoogle Scholar
  37. [37] Luby Michael. 2002. LT codes. In IEEE FOCS.Google ScholarGoogle Scholar
  38. [38] Paul J. Marcelis, Vijay Rao, and R. Venkatesha Prasad. 2017. DaRe: Data recovery through application layer coding for LoRaWAN. In IoTDI. 97–108.Google ScholarGoogle Scholar
  39. [39] Mo Biyuan, Dong Wei, Chen Chun, Bu Jiajun, and Wang Qiang. 2012. An efficient differencing algorithm based on suffix array for reprogramming wireless sensor networks. In IEEE ICC.Google ScholarGoogle Scholar
  40. [40] Murtagh Fionn and Contreras Pedro. 2012. Algorithms for hierarchical clustering: An overview. Wiley Interdiscip. Rev.: Data Min. Knowl. Discov. 2, 1 (2012), 86–97.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Ni Tao, Chen Yongliang, Xu Weitao, Xue Lei, and Zhao Qingchuan. 2023. XPorter: A study of the multi-port charger security on privacy leakage and voice injection. In ACM MobiCom.Google ScholarGoogle Scholar
  42. [42] Ni Tao, Lan Guohao, Wang Jia, Zhao Qingchuan, and Xu Weitao. 2023. Eavesdropping mobile app activity via radio-frequency energy harvesting. In USENIX Security.Google ScholarGoogle Scholar
  43. [43] Ni Tao, Li Jianfeng, Zhang Xiaokuan, Zuo Chaoshun, Wang Wubing, Xu Weitao, Luo Xiapu, and Zhao Qingchuan. 2023. Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning. In ACM MobiCom.Google ScholarGoogle Scholar
  44. [44] Ni Tao, Zhang Xiaokuan, Zuo Chaoshun, Li Jianfeng, Yan Zhenyu, Wang Wubing, Xu Weitao, Luo Xiapu, and Zhao Qingchuan. 2023. Uncovering user interactions on smartphones via contactless wireless charging side channels. In IEEE S&P.Google ScholarGoogle Scholar
  45. [45] Peng Yao, Shangguan Longfei, Hu Yue, Qian Yujie, Lin Xianshang, Chen Xiaojiang, Fang Dingyi, and Jamieson Kyle. 2018. PLoRa: A passive long-range data network from ambient LoRa transmissions. In ACM SIGCOMM.Google ScholarGoogle Scholar
  46. [46] Puglisi Simon J., Smyth William F., and Turpin Andrew H.. 2007. A taxonomy of suffix array construction algorithms. ACM Comput Surv. 39, 2 (2007), 4–es.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Ren Yidong, Liu Li, Li Chenning, Cao Zhichao, and Chen Shigang. 2022. Is LoRaWAN really wide? Fine-grained LoRa link-level measurement in an urban environment. In IEEE ICNP.Google ScholarGoogle Scholar
  48. [48] Shand Mark and Vuillemin Jean. 1993. Fast implementations of RSA cryptography. In IEEE ARITH.Google ScholarGoogle Scholar
  49. [49] Shen Cheng, Liu Tian, Huang Jun, and Tan Rui. 2021. When LoRa meets EMR: Electromagnetic covert channels can be super resilient. In IEEE S&P.Google ScholarGoogle Scholar
  50. [50] Solutions Monsoon. 2021. High Voltage Power Monitor: Monsoon solutions: Bellevue. Retrieved from: https://www.msoon.com/high-voltage-power-monitorGoogle ScholarGoogle Scholar
  51. [51] Sun Yin, Koksal C. Emre, Kim Kyu-Han, and Shroff Ness B.. 2014. Scheduling of multicast and unicast services under limited feedback by using rateless codes. In IEEE INFOCOM.Google ScholarGoogle Scholar
  52. [52] Sun Zehua, Ni Tao, Yang Huanqi, Liu Kai, Zhang Yu, Gu Tao, and Xu Weitao. 2023. FLoRa: Energy-efficient, reliable, and beamforming-assisted over-the-air firmware update in LoRa networks. In ACM/IEEE IPSN.Google ScholarGoogle Scholar
  53. [53] Sun Zehua, Yang Huanqi, Liu Kai, Yin Zhimeng, Li Zhenjiang, and Xu Weitao. 2022. Recent advances in LoRa: A comprehensive survey. ACM Trans. Sensor Netw. 18, 4 (2022), 1–44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Tong Shuai, Xu Zhenqiang, and Wang Jiliang. 2020. CoLoRa: Enabling multi-packet reception in LoRa. In IEEE INFOCOM.Google ScholarGoogle Scholar
  55. [55] Tridgell Andrew. 1999. Efficient algorithms for sorting and synchronization. (1999).Google ScholarGoogle Scholar
  56. [56] Wang Xiong, Kong Linghe, Wu Zucheng, Cheng Long, Xu Chenren, and Chen Guihai. 2020. SLoRa: Towards secure LoRa communications with fine-grained physical layer features. In ACM SenSys.Google ScholarGoogle Scholar
  57. [57] Wolf Jack. 1978. Efficient maximum likelihood decoding of linear block codes using a trellis. IEEE Trans. Inf. Theor. 24, 1 (1978), 76–80.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. [58] Xia Xianjin, Chen Qianwu, Hou Ningning, and Zheng Yuanqing. 2022. HyLink: Towards high throughput LPWANSs with LoRa compatible communication. In ACM SenSys.Google ScholarGoogle Scholar
  59. [59] Xia Xianjin, Chen Qianwu, Hou Ningning, Zheng Yuanqing, and Li Mo. 2023. XCopy: Boosting weak links for reliable LoRa communication. In ACM MobiCom.Google ScholarGoogle Scholar
  60. [60] Xia Xianjin, Hou Ningning, Zheng Yuanqing, and Gu Tao. 2021. PCube: Scaling LoRa concurrent transmissions with reception diversities. In ACM MobiCom.Google ScholarGoogle Scholar
  61. [61] Xia Xianjin, Zheng Yuanqing, and Gu Tao. 2019. FTrack: Parallel decoding for LoRa transmissions. In ACM SenSys.Google ScholarGoogle Scholar
  62. [62] Xie Binbin and Xiong Jie. 2020. Combating interference for long range LoRa sensing. In ACM SenSys.Google ScholarGoogle Scholar
  63. [63] Xie Binbin, Yin Yuqing, and Xiong Jie. 2021. Pushing the limits of long range wireless sensing with LoRa. ACM Interact. Mob. Wear. Ubiq. Technol. 5, 3 (2021), 1–21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. [64] Xu Weitao, Jha Sanjay, and Hu Wen. 2018. LoRa-key: Secure key generation system for LoRa-based network. IEEE Internet Things J. 6, 4 (2018), 6404–6416.Google ScholarGoogle Scholar
  65. [65] Yabanova Ismail, Taskin Sezai, Ekiz Huseyin, and Cimen Hasan. 2012. Bootloader design application for embedded systems by using controller area network. Computer Science 1 (2012), 952–957.Google ScholarGoogle Scholar
  66. [66] Yang Huanqi, Sun Zehua, Liu Hongbo, Xia Xianjin, Zhang Yu, Gu Tao, Hancke Gerhard, and Xu Weitao. 2023. ChirpKey: A chirp-level information-based key generation scheme for LoRa networks via perturbed compressed sensing. In IEEE INFOCOM.Google ScholarGoogle Scholar
  67. [67] Yang Qiang, Cui Kaiyan, and Zheng Yuanqing. 2023. VoShield: Voice liveness detection with sound field dynamics. In IEEE INFOCOM.Google ScholarGoogle Scholar
  68. [68] Zhang Fusang, Chang Zhaoxin, Xiong Jie, Zheng Rong, Ma Junqi, Niu Kai, Jin Beihong, and Zhang Daqing. 2021. Unlocking the beamforming potential of LoRa for long-range multi-target respiration sensing. ACM Interact. Mob. Wear. Ubiq. Technol. 5, 2 (2021), 1–25.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 20, Issue 3
        May 2024
        634 pages
        ISSN:1550-4859
        EISSN:1550-4867
        DOI:10.1145/3613571
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 February 2024
        • Online AM: 22 January 2024
        • Accepted: 11 January 2024
        • Revised: 10 January 2024
        • Received: 1 November 2023
        Published in tosn Volume 20, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)262
        • Downloads (Last 6 weeks)102

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text