Solution Security Requirements - How does LoRaWAN work and what do customers need to know?

Solution Security Requirements - How does LoRaWAN work and what do customers need to know?

LoRaWAN: An Introduction to Security Requirements

LoRaWAN is a Low-Power Wide Area Network (LPWAN) technology that enables secure and reliable communication between Internet of Things (IoT) devices. The technology provides long-range communication capabilities, making it ideal for IoT applications that require a low-power, low-cost, and secure network.

In this knowledge base (KB) article, we will provide an overview of the security requirements for a LoRaWAN network, and highlight the key aspects that organizations need to pay attention to when implementing a LoRaWAN network.

Security and Firewall Rules

To ensure that a LoRaWAN Gateway has access to the Internet and is properly segmented from the rest of the customer network, the following actions should be taken:
  1. Limit incoming traffic to the Gateway from the customer network by creating rules that allow only certain traffic (e.g., specific IP addresses, ports, protocols).
  2. Enable logging for the firewall to track incoming and outgoing traffic and detect potential security threats.
  3. It is recommended to set up a network firewall to protect the network from external threats. This can be done by configuring the firewall on the network or by installing a separate firewall device.
  4. Allow outgoing traffic from the Gateway to the Internet through the firewall by creating a rule that allows traffic to be sent to any destination
IP Address
Protocol
Ports
54.237.25.204
TCP
443
3.222.152.56
TCP
443
52.14.83.204
TCP, UDP
22

3478

8080

8443


Authentication

Diagram

Description automatically generated


Encryption

LoRaWAN uses Advanced Encryption Standard (AES) encryption to protect the confidentiality and integrity of data transmitted between the end devices and the network server. This ensures that sensitive data is protected from eavesdropping and tampering during transmission.


Network Server Authentication

The network server must authenticate end devices before allowing them to join the network. This is achieved through the use of unique device keys and a secure join procedure. The secure join procedure involves the exchange of cryptographic keys between the end device and the network server, ensuring that only authorized devices can join the network.

Message integrity

LoRaWAN uses a message integrity code (MIC) to verify the integrity of each message transmitted between sensors and the central network server.
A picture containing graphical user interface

Description automatically generated

Conclusion

Overall, LoRaWAN provides a secure and reliable communication method for low-power, low-cost devices in a wide area network. The use of a centralized gateway and various security features helps to protect the communication between the sensors and the central network server.

Support

If you have any questions regarding security requirements, please contact ConnectedFresh Support at support@connectedfresh.com.

    Item Categories

    All Gateways                            All Sensors
    Temperature Sensors              Door Sensors
    Tracker Sensors                       Leak Detection Sensors

      • Related Articles

      • What is LoRaWAN and how does it work?

        LoRaWAN: An Introduction The Internet of Things (IoT) has become a crucial aspect of modern life, enabling devices to communicate with each other and with the internet to provide advanced services. To support this vast network of devices, various ...
      • LoRaWAN Gateway Placement Guide: Maximizing Coverage and Performance

        Here is a guide to properly place a LoRaWAN gateway in a food establishment: Location The gateway should be placed in a central location that is easily accessible for maintenance purposes and allows for maximum coverage within the establishment. ...
      • Setting Up Your Dragino LHT65N/LHT65S Temperature Sensor: A Step-by-Step Guide

        Welcome to the world of IoT and ConnectedFresh! This article will guide you through the process of setting up your Dragino LHT65S/LHT65N temperature sensor, which runs on the LoRaWAN network. With just a few simple steps, you'll be up and running in ...