@article{ruotsalainen_experimental_2019, title = {Experimental {Investigation} on {Wireless} {Key} {Generation} for {Low} {Power} {Wide} {Area} {Networks}}, doi = {10/ggxwns}, abstract = {The wireless key generation is a potential way to implement information theoretically secure key refreshment for IoT devices. The state-of-the-art work on key generation mainly utilizes the wireless local area network technologies. However, they have not sufficiently considered the typical characteristics of low power wide area network (LPWAN) such as lengthy payloads, duty cycled transmission and reception, or limitations for channel utilization. In this paper, we carried out a comprehensive experimental investigation on key generation applied with LPWAN, taking LoRa/LoRaWAN as case studies. A key generation protocol optimized for typical LPWAN applications is proposed. According to the extensive evaluations with deep in-building and long distance (up to 7 km) outdoor LoRaWAN links, extraction of keys with high randomness becomes feasible. Moreover, we study the achievable AES128 key refreshment periods for different eavesdropper key disagreement rates. As indicated by our measurement based evaluations, the AES128 key can be renewed every three hours with the proposed key generation protocol and with the maximum LoRaWAN spreading factor setting (longest range). A further interesting evaluation result demonstrates that a secure key refreshment is still possible even when the eavesdropper key disagreement rate is very close to the rate of the legitimate users.}, journal = {IEEE Internet of Things Journal}, author = {Ruotsalainen, Henri and Zhang, Junqing and Grebeniuk, Stepan}, month = nov, year = {2019}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, best, best haruotsa, peer-reviewed}, }