Next Article in Journal
Optical Gas-Cell Dynamic Adsorption in a Photoacoustic Spectroscopy-Based SOF2 and SO2F2 Gas Sensor
Next Article in Special Issue
Widely-Linear Digital Self-Interference Cancellation in Full-Duplex USRP Transceiver
Previous Article in Journal
CAVVPM: Challenge-Based Authentication and Verification of Vehicle Platooning at Motorway
Previous Article in Special Issue
Drone Detection and Classification Using Physical-Layer Protocol Statistical Fingerprint
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Scheme for Discrete and Secure LoRa Communications

CNRS UMR 6285, Lab-STICC, Universuty Brest, CNRS, CS 93837, 6 Avenue Le Gorgeu, CEDEX 3, 29238 Brest, France
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(20), 7947; https://doi.org/10.3390/s22207947
Submission received: 9 September 2022 / Revised: 8 October 2022 / Accepted: 12 October 2022 / Published: 18 October 2022
(This article belongs to the Special Issue Physical-Layer Security for Wireless Communications)

Abstract

:
In this paper, we present a new LoRa transceiver scheme to ensure discrete communications secure from potential eavesdroppers by leveraging a simple and elegant spread spectrum philosophy. The scheme modifies both preamble and payload waveforms by adapting a current state-of-the-art LoRa synchronization front-end. This scheme can also be seen as a self-jamming approach. Furthermore, we introduce a new payload demodulation method that avoids the adverse effects of the traditional cross-correlation solution that would otherwise be used. Our simulation results show that the self-jamming scheme exhibits very good symbol error rate (SER) performance with a loss of just 0.5 dB for a frequency spread factor of up to 10.

1. Introduction

In the past few years, LoRa has become a front-runner in low-power wide-area network (LPWAN) solutions applied to low-energy/low-cost Internet of Things (IoT) transceivers and is increasingly implemented to achieve practical solutions in areas such as agro-informatics [1], smart home design [2] and air-quality monitoring systems [3]. The increasing number of LoRa transceivers creates increased opportunities for malicious entities to disrupt or eavesdrop LoRa communications. Many studies have been conducted by the research community to evaluate the impact of jamming on performance and countermeasures have been proposed to tackle these threats. Below, we briefly review relevant studies that consider LoRa jamming schemes.

1.1. Previous Work on LoRa Jamming

In [4], the authors investigated the impact of traditional jammers, such as band and tone jamming, on the LoRa demodulation process and highlighted the sub-optimal energy efficiency of these jamming schemes. Other research has considered smarter and more efficient jammers involving jamming LoRa nodes with LoRa signals. In [5,6,7,8], LoRa reactive jammers (the jamming signal is only sent on detection of an incoming legitimate LoRa signal) and random jammers with a frequency hopping scheme were implemented and assessed on real-world devices. The authors concluded that jammer efficiency is obtained if the LoRa signal detection scheme is well-designed with good detection capability, and has a latency as low as possible to align the jamming signal in time with the signal of interest. In other studies, investigation of jamming where the jammer seeks to prevent a legitimate LoRa node to access the network was considered. In [9], a jammer was designed to reduce received signal strength indicator (RSSI) variations at the legitimate LoRa node, leading to an almost constantly obtained DevNonce key ID and preventing network access. The authors of [10] proposed a simple jammer detection scheme based on this philosophy, while [11,12] evaluated the jamming impact but on the global LoRa WAN network, with, for example, gateway occupancy or dropping probability metrics.
The eavesdropping case has, however, attracted less attention by the research community. To ensure secret communications, most of the proposed solutions rely on cryptographic schemes. For example, a frequency-hopping scheme was proposed in [13], while [14] introduced a reduced complexity advanced encryption system (AES) solution for the key management of LoRa WAN. Finally, recently in [15] a physical layer encryption method leveraging the randomness of the channel was presented to bypass the use of AES that imposes a burden on complexity for low-cost LoRa nodes.

1.2. Novelty and Contributions

In this paper, we propose a cooperative scheme between the transmitter and the receiver that further enhances [15] the scheme by improving the capacity for discrete LoRa transmission. The central notion is to leverage the well-known LoRa interference impact on demodulation but constructively by spreading the useful signal energy in the frequency space with a fixed power constraint. This can be seen as self-jamming with an added layer of spectrum spreading on top of LoRa. As the receiver is cooperative, the latter can then demodulate successfully. However, in realistic conditions, time and frequency synchronization between the transmitter and the receiver must be satisfied. We therefore propose a modified and adapted version of current state-of-the-art LoRa synchronization techniques as a solution.
The key contributions of the paper are as follows:
  • Proposal of an enhanced scheme ensuring discrete and secure communication.
  • A refined current LoRa synchronization front-end.
  • Two variants of the scheme are proposed to adapt to power/complexity constraints of both uplinks and downlinks.
The remainder of the paper is organized as follows. In Section 2, we introduce the system model and some LoRa modulation basics. Section 3 presents a first approach to combatting an eavesdropper by modifying the preamble waveforms (introducing a self-jamming scheme). A modified synchronization front-end based on state-of-the-art techniques is proposed in Section 4. In Section 5, we investigate a possible threat where, in certain circumstances, an eavesdropper may synchronize itself. In Section 6, we enhance our initial self-jamming solution by proposing a modified payload demodulation scheme. Finally, we provide simulation results in Section 7 to evaluate the self-jamming method.

1.3. Notations

Table 1 lists the most relevant notations used throughout the paper.

2. System Model

2.1. Eavesdropping Scenario

We consider the eavesdropping scenario presented in Figure 1. There are three entities, Alice, Bob and Eve, denoted with A, B and E characters, respectively. A and B communicate with each other (Alice–Bob direction in the figure) in a cooperative way and exchange sensitive data that must be kept secret from eavesdroppers such as E. B has the role of the gateway and both uplink and downlink links are taken into account, depending on the A role. If A is a pure LoRa sensor, the uplink is much more critical than the downlink as the latter mainly consists of signaling traffic. However, if A is an actuator driven by incoming commands from B, for example, the downlink must be protected from E. We are then interested in securing both up- and downlinks and also ensuring discrete communication, reducing the intercept capability of E. E is, in this context, a fully passive receiver located sufficiently close to A and B to be able to detect both A or B LoRa signals. In this scenario, all channels separating entities are flat with additive white Gaussian noise (AWGN) and they are assumed to be symmetric. Frequency-selective channels may be considered in the future as an extension of this study.

2.2. LoRa Modulation Overview

LoRa waveforms are a type of chirp spread spectrum (CSS) signal. These signals rely on sine waves with instantaneous frequency (IF) that vary linearly with time over the frequency range f [ B / 2 ; B / 2 ] and the time range t [ 0 ; T ) (T, the symbol period). This basic signal is called an upchirp or downchirp when IF increases or decreases with time, respectively. A Lora waveform is an M-ary digital modulation, comprised of M possible chirp modulations where the IF of the upchirp is shifted by the M possible values. The modulo operation is applied to ensure that the frequency remains in the interval [ B / 2 ; B / 2 ] . The LoRa parameters are chosen such that B T = M with M = 2 S F and S F { 7 , 8 , , 12 } is called the spreading factor, which also corresponds to the number of bits for a LoRa symbol. In the discrete-time signal model, the chip rate ( R c = 1 / T c = M / T ) is usually used to sample the received signal, i.e., the sample period is T s = T c = T / M = 1 / B . The signal then has M samples over one symbol period T. Each symbol a { 0 , 1 , , M 1 } is mapped to an upchirp that is temporally shifted by τ a = a T c period. We note that a temporal shift results in a change in the initial IF.
This behavior is the heart of the M-ary chirp modulation. An expression of discrete LoRa waveforms sampled at t = k T s ( T s = T c ) has been derived by the authors in [16]:
x ( k T s ; a ) x a [ k ] = e 2 j π k a M 1 2 + k 2 M k = 0 , 1 , , M 1 .
The upchirp is the LoRa waveform with symbol index a = 0 .

2.3. LoRa Demodulation Scheme

The authors of [17] derived a simple and efficient solution to demodulate LoRa signals. In an AWGN flat-fading channel, the demodulation process is based on the maximum likelihood (ML) detection scheme. The received signal is:
r [ k ] = α x a [ k ] + w [ k ]
with α = | α | e j ϕ , the complex gain of the channel and w [ k ] an independent and identical distributed (i.i.d.) complex AWGN with zero-mean and variance σ 2 = E [ | w [ k ] | 2 ] . The signal-to-noise ratio (SNR) is defined as: S N R = | α | 2 P s / σ 2 = 1 / σ 2 with P s the transmitted signal power and, without loss of generality, we assume | α | 2 = P s = 1 . The ML detector aims to select the frequency index n that maximizes the scalar product r , x n for n { 0 , 1 , , M 1 } , defined as:
r , x n = k = 0 M 1 r [ k ] x n * [ k ] = k = 0 M 1 r [ k ] x 0 * [ k ] r ˜ [ k ] e j 2 π n M k = R ˜ [ n ]
The demodulation stage proceeds with two simple operations:
  • multiply the received waveform by a downchirp x 0 * [ k ] (also called dechirping),
  • compute R ˜ [ n ] , the discrete Fourier transform (DFT) of r ˜ [ k ] , and select the discrete frequency index a ^ that maximizes R ˜ [ n ] .
In this way, the dechirp process merges all the signal energy into a unique frequency bin a that can be easily retrieved by taking the magnitude (non-coherent detection) of R ˜ [ n ] . The detected symbol is then:
a ^ = arg max n | R ˜ [ n ] |

2.4. LoRa Frame Structure

LoRa messages are transmitted in frames that follow the specific format depicted in Figure 2.
The frame consists of a preamble followed by the payload symbols. The preamble is a critical component as it realizes the three following processes required to correctly demodulate the N d payload symbols:
  • detecting the beginning of the frame by leveraging the N u p upchirps.
  • performing both frequency and time synchronization with the help of the N u p upchirps and N d o w n downchirps.
  • detecting if the received frame is dedicated to the receiver by checking if the N I D = 2 consecutive network identification symbols correspond to its stored value.
LoRa transceivers generally use N u p = 8 , a variable N d value, and a fixed value N d o w n = 2.25 . The number of symbols in the preamble and the entire frame are denoted, respectively, N p r e = N u p + N d o w n and N f r a m e = N p r e + N I D + N d .
We choose to slightly change the frame format as depicted in Figure 3 with the following modifications:
  • Without loss of generality, the two identification symbols and the last quarter downchirp are ignored. The latter is not leveraged in the synchronization front-end. The symbol number in the frame then becomes N f r a m e = N p r e + N d .
  • We also set the condition N d o w n = N u p . This enables a balanced noise immunity between the upchirps and downchirps as these are averaged during the synchronization procedure.
The transmitted frame is then the concatenation of the upchirp, downchirp and payload symbol waveforms:
x [ k ] = s u p , f r a m e [ k ] + s d o w n , f r a m e [ k N u p M ] + s d a t a [ k N p r e M ]

3. Combat Basic LoRa Eavesdropper with Modified Preamble Waveform

A first approach to combat E is to only modify the preamble waveforms to disrupt its synchronization. A synchronization error will irredeemably lead to a demodulation error, preventing E from obtaining the critical data. The modified preamble waveforms are also designed to considerably increase the noise sensitivity for E and, thus, the discrete capacity of the scheme, while avoiding too much degradation of the performance of the link between A and B. The cooperative receiver leverages these modifications to improve its processing gain as much as possible.
The modified DFT preamble upchirp waveform in the preamble is illustrated in Figure 4. The green DFT bin depicts the legacy format. It consists of a unique DFT bin at known location n = a u p = 0 , containing all the signal power M P s . The basic idea of the discrete scheme is to spread the power over several DFT bins with a uniform distribution in respect of a fixed power constraint. This is represented by the DFT bins with a dashed line in the figure. The modified preamble can be written as:
s u p , f r a m e [ k ] = i = 0 N u p 1 s u p [ k i M ]
s d o w n , f r a m e [ k ] = i = N u p N p r e 1 s d o w n [ k i M ]
with:
s u p [ k ] = P J u = 0 U 1 x ( a u p m u p u ) mod M [ k ]
s d o w n [ k ] = P J u = 0 U 1 x ( a d o w n m d o w n u ) mod M * [ k ]
and U, the number of DFT bins present, P J , the power level of each DFT bin with P J = P s / U , m u p u and m d o w n u , the u-th relative delay of the preamble upchirp and downchirp, respectively. We also note m u p , the associated delay vector that is sorted in ascending order, i.e., m u p 0 = 0 and 0 < m u p u > 0 < M . Each m u p u delay must be unique to prevent a DFT bin overlapping issue, leading to adding DFT magnitudes and, thus, reducing the discrete capacity of the scheme. Note that U = 1 and a u p = 0 lead to the legacy format. The preamble downchirps follow the same structure but with a d o w n and m d o w n different from a u p and m u p to improve privacy.
Neglecting noise, the i-th received dechirped preamble upchirp or downchirp DFT is:
R ˜ u p [ n ] = α M P J u = 0 U 1 δ [ n ( a u p m u p u ) mod M ]
R ˜ d o w n [ n ] = α M P J u = 0 U 1 δ [ n ( a d o w n m d o w n u ) mod M ]
Note that each DFT bin has a null imaginary part. The DFT bin locations must remain secret from E to prevent its correct synchronization. a u p , m u p , a d o w n and m d o w n must then be random values that must be perfectly known by both A and B. That is, a specific procedure needs to be performed to satisfy this constraint. Possible solutions include the physical layer security schemes that leverage the randomness and reciprocity of the channel to enable both A and B to extract a pseudo-random bit sequence. These methods rely on the random received signal strength indicator (RSSI) variations, as LoRa transceivers have a built-in RSSI read-out feature, a solution chosen in [15], or using random channel path phase variation [18]. In practice, the A and B extracted sequences do not match perfectly and a reconciliation procedure is then necessary. This step requires the sequences exchange and may be vulnerable to eavesdroppers. The use of the Chinese remainder theorem (CRT), as in [15], or a code-word approach as in [19], are possible solutions to tackle this issue.

4. Self-Jamming Synchronization Front-End

In this section, we introduce desynchronizations that a receiver undergoes in practice, their effects on the LoRa demodulation, and the synchronization front-end designed to address these issues.

4.1. Time Desynchronization Model—Sampling Time Offset (STO)

In real conditions, the receiver continuously collects chunks of M samples that are not necessarily aligned with the receiver, i.e., the sampling times are different between the transmitter and the receiver. This produces a temporal window shift τ up to a symbol period T, as depicted in Figure 5. This effect, referred to as the sampling time offset (STO), introduces inter-symbol interference (ISI) if the previous symbol is different from the current symbol, i.e., a a and a a + in the figure. The higher the value of τ , the greater the ISI, with maximum signal deformation when τ T / 2 .
The preamble structure prevents ISI that could degrade synchronization performance, as consecutive upchirps and downchirps are identical (see Equations (8) and (9)). τ is modeled based on the LoRa sampling frequency F s = B and can then be converted to a certain number of sampling periods as:
τ = S T O i n t + S T O f r a c S T O × T s
with S T O i n t = τ / T s [ 0 ; M 1 ] , the integer number of sampling periods plus a fraction of a sampling period S T O f r a c = S T O S T O i n t [ 0.5 ; 0.5 ) . . denotes the rounding operation to the nearest integer.

4.2. Frequency Desynchronization Model

Due to hardware imperfections, other desynchronizations may occur in the frequency domain, such as the carrier-frequency offset (CFO) and the sampling-frequency offset (SFO).

4.2.1. Carrier-Frequency Offset (CFO)

As a reminder, the CFO is the residual carrier frequency present in the base-band signal at the receiver side. The local oscillators of the transmitter and the receiver are not perfectly centered to the desired carrier frequency F c . A residual frequency appears, then:
Δ f = F c t F c r
with F c t (resp. F c r ), the carrier frequency used by the transmitter (resp. the receiver). By analogy to the STO, Δ f can be converted to a number of frequency bins:
Δ f = C F O i n t + C F O f r a c C F O × B M
with C F O i n t = Δ f / ( B / M ) [ 0 ; M 1 ] , the integer number of DFT bins plus a fraction of a DFT bin C F O f r a c = C F O C F O i n t [ 0 ; 1 ) . . denotes the floor operation.

4.2.2. Sampling-Frequency Offset (SFO)

The SFO is a mismatch between the current and the desired sampling frequency at the receiver side:
F s = F s + S F O
In hardware implementation, and especially for low-cost IoT transceivers, such as LoRa, the same oscillator is used to perform the sampling and the carrier transposition. That is, the CFO and SFO are generated from the same source and their relationship represented as follows [20]:
S F O = B F c × Δ f

4.3. Time and Frequency Desynchronization Effects on LoRa

C F O i n t and S T O i n t have the effect of shifting the DFT bin position (we consider U = 1 for the sake of simplicity) by a certain amount that is different when considering either upchirps: a ^ u p = ( a u p + C F O + S T O ) mod M or downchirps: a ^ d o w n = ( a d o w n + C F O S T O ) mod M . The fractional part C F O f r a c and S T O f r a c progressively spread the DFT bin of interest energy to its neighbor as C F O f r a c or S T O f r a c gets closer to 0.5: n = a u p + 1 and n = a d o w n 1 for C F O ; S T O has the opposite behavior.
The S F O has the consequence, over time, of progressively distorting the received signal; a discrete model for LoRa is derived in [21] (considering upchirp symbols, for example, neglecting noise and channel path gains):
r ˜ i [ k ] x ˜ a i [ k ] e 2 j π k i B F s 2 B F s
with x ˜ a i [ k ] , the i-th received LoRa signal with symbol value a i .

4.4. Synchronization Scheme

The adapted state-of-the-art LoRa synchronization front-end of our self-jamming scheme is presented in Figure 6. The front-end starts with a first pre-processing block which involves sampling the received signal at an over-sampled rate R × F s , dechirping N u p blocks of M samples (downsampled by R factor), estimating and correcting C F O f r a c for these N u p blocks, and computing the N u p corrected DFTs. The receiver continues with the preamble detection as, in practice, the latter operates in real time.
Once the preamble is detected, the receiver re-aligns the symbols in the detected frame by C F O f r a c and estimates the other synchronization parameters, i.e., C F O i n t , S F O , S T O i n t and S T O f r a c . The estimation of both C F O and S T O is not trivial. As their effects are not independent of each other, the pipeline must then be designed wisely. It finally performs a frame correction to re-align itself in time and frequency. The over-sampling by the R rate is required to mitigate S T O f r a c .

4.4.1. Fractional CFO Correction and Preamble Detection

C F O f r a c can be estimated and compensated in this step. As the C F O f r a c estimator found in [22] has low sensitivity to the presence of multiple DFT peaks and operates blindly, we choose then to use this estimator. To ensure correct C F O f r a c estimation, no energy other than AWGN must be present in the left and right adjacent DFT bins of each of the U DFT peaks. We set the constraint of choosing delays with a minimal gap of ϵ DFT positions between each. This is also valid for proper S T O f r a c estimation. Satisfying the constraint ϵ , the maximum number of virtual paths U value is:
U m a x = M ϵ 1
giving U m a x = 25 for ϵ = 5 and S F = 7 , for example. In [22], the authors proposed an estimator that relies on the well-known three spectral lines (TSL) scheme by deriving C F O ^ f r a c over N u p consecutive symbols. Each N u p received desynchronized symbol y i [ k ] is then corrected:
y i [ k ] = y i [ k ] e 2 j π k C F O ^ f r a c M
The preamble detection relies on detecting the presence of consecutive demodulated symbols. With very low AWGN and a well-aligned received signal, N u p identical and consecutive symbols should be detected but the noise progressively introduces errors and, in practice, it is very difficult to detect this specific pattern. To improve the detection performance at the cost of an increased false alarm rate, we set the constraint to detect at least L consecutive symbols having a maximum value difference of ± 1 .
Due to the presence of multiple DFT peaks of the same magnitude, the classic demodulation scheme in (4) is not suitable as the detected DFT peak location will change over the N u p upchirps. To tackle this issue, we propose a cross-correlation approach. As the relative delays m u p are perfectly known by the receiver, the latter can rebuild locally the expected dechirped preamble upchirp with assumed transmitted power P s = 1 . This is denoted S ˜ u p r e f [ n ] . Then, for L consecutive received dechirped symbols, it computes the circular cross-correlation and extracts the maximum argument:
F u p , l [ m ] = n = 0 M 1 | S ˜ u p r e f [ n ] | | Y ˜ l [ ( n m ) mod M ] |
n l = arg max m F u p , l [ m ]
with p l p + ( L 1 ) , p = { 0 , 1 , , p m a x } , 0 m M 1 and Y ˜ l [ n ] , the DFT of y ˜ l [ k ] . Note that p m a x is the last block of L demodulated symbols until preamble detection. Equation (20) can be efficiently computed with a fast Fourier transform (FFT) algorithm as:
F u p , l = I F F T F F T | S ˜ u p r e f | × F F T | Y ˜ l | *
The preamble is detected if ( n p + i + j ) mod M = n p for i = { 1 , 2 , , L 1 } and j = { 1 , 0 , 1 } . Once the preamble is detected, the rest of the symbols in the frame are corrected by C F O ^ f r a c .

4.4.2. Half Fractional STO Detection

As previously stated in Section 4.3, as S T O f r a c gets closer to 0.5, the neighbor DFT bin energy progressively increases, leading to higher noise sensitivity. When S T O f r a c 0.5 , two DFT peaks with almost the same magnitude are present, creating detection uncertainty and preventing correct C F O i n t and S T O i n t estimation. That is, S T O f r a c must be mitigated before, independently from C F O i n t and S T O i n t . The authors in [23] proposed a solution by performing an initial S T O f r a c mitigation, albeit partial, to remove this uncertainty.
We propose a different approach with a binary statistical test by detecting if S T O f r a c 0.5 . We define the hypotheses H 0 , H 1 as S T O f r a c 0.5 and S T O f r a c = 0.5 , respectively. The basic idea is to evaluate the DFT magnitude difference between the peak of interest and its neighbor bin. The less the difference, the closer to 0.5 S T O f r a c . Below a certain difference threshold, the receiver decides H 1 , otherwise H 0 . The detector is designed as follows:
  • The N u p preamble upchirp DFTs are averaged to reduce noise sensitivity:
    Y ˜ u p [ n ] = 1 N u p i = 0 N u p 1 Y ˜ i [ n ]
  • The following cyclic cross-correlation is computed and normalized:
    F u p [ m ] = n = 0 M 1 | S ˜ u p r e f [ n ] | | Y ˜ u p [ ( n m ) mod M ] |
    F u p [ m ] = F u p [ m ] max m F u p [ m ]
  • We extract the left and right neighbor DFT bin magnitudes of the maximum DFT peak and compute the criterion δ :
    n m a x u p = arg max m F u p [ m ]
    v = F u p [ ( n m a x u p 1 ) mod M ] v + = F u p [ ( n m a x u p + 1 ) mod M ]
    δ = 1 max ( v , v + )
  • S T O f r a c 0.5 is finally detected as:
    δ H 0 H 1 λ S T O f r a c 0.5
The frame contaminated by S T O f r a c is then corrected with S T O ^ f r a c = 0.5 (if detected) by discarding the first R × ( M S T O f r a c ) samples. There are then N u p 1 upchirp symbols in the preamble.
Figure 7 illustrates the evolution of averaged δ , denoted δ , as a function of S T O f r a c = { 0 , 0.1 , , 0.9 } ( R = 10 ) for several SNR values S N R d B = { 15 , 12 , 9 , 6 } , U = 4 and S F = 7 . The delays m u p are chosen randomly and uniformly in [ 0 ; M 1 ] and satisfying the gap ϵ constraint.
We can see from the figure that δ progressively decreases as S T O f r a c gets closer to 0.5 with the minimal point reached for S T O f r a c = 0.5 . δ has a symmetric pattern with S T O f r a c = 0.5 . The noise has the effect of flattening the curve, reducing the contrast between S T O f r a c values. The threshold λ S T O f r a c 0.5 must be chosen wisely. A low value will increase the non-detection probability, a situation that must be avoided as far as possible. A very high value will lead to almost constant detection; the corrected frame will then have as many as S T O f r a c residuals with no S T O f r a c 0.5 detection enabled.
In simulations, λ S T O f r a c 0.5 = 0.3 is a balanced value for the LoRa SNR range of interest S N R d B = { 15 , 14 , , 5 } . We note that adjacent values S T O f r a c = { 0.4 , 0.6 } are almost constantly detected as S T O f r a c = 0.5 , but the residual is ± 0.1 , a value that has a negligible impact on demodulation performance.
Figure 8 illustrates the histograms of δ for S T O f r a c = { 0 , 0.1 , 0.2 , 0.3 , 0.4 , 0.5 } , U = 4 , S N R d B = 8 and S F = 7 . We note that the δ statistic follows a near-Gaussian distribution as the computed cross-correlation is a sum of Rayleigh random variables (RV). With extensive simulation results, we note that this distribution is slightly U dependent. Furthermore, increasing SF results in similar histograms but for lower SNRs, and the derived histogram for S T O f r a c s y m = 1 S T O f r a c is nearly the same as for S T O f r a c (symmetry).

4.4.3. CFO and STO Integer Estimation

The next step in the synchronization front-end is to estimate C F O i n t and S T O i n t . The process follows the same philosophy as so far applied to the cross-correlation approach. The receiver keeps the previously computed n m a x u p in (26) and performs steps (23), (24), (26) for the preamble downchirps to derive n m a x d o w n . C F O i n t and S T O i n t are simply derived as:
C F O ^ i n t = ( n m a x u p + n m a x d o w n ) mod M 2
S T O ^ i n t = ( a u p + n m a x u p C F O ^ i n t ) mod M
The SFO is simply derived as:
S F O ^ = ( C F O ^ i n t + C F O ^ f r a c ) × B 2 M × F c
As stated in [23], this synchronization scheme cannot correctly detect C F O i n t M / 4 but, in practice, it is very unlikely to have such a high value.

4.4.4. Fractional STO Part Estimation

The final step is to estimate S T O f r a c in the case where S T O f r a c 0.5 has not been detected earlier. The scheme is based on the TSL approach proposed in [23] but with slight modifications to be functional with our self-jamming scheme. The main steps are summarized in what follows:
  • The averaged preamble DFT upchirps Y ˜ u p [ n ] are re-aligned by removing C F O ^ i n t and S T O ^ i n t shifts. This is simply effected by performing a left circular permutation.
  • For each of the U DFT peaks in Y ˜ u p [ n ] , we extract its value and the left and right neighbor bins as:
    w c , u = Y ˜ u p [ ( a u p m u p u + c ) mod M ] , c { 1 , 0 , 1 }
  • S T O f r a c is finally averaged over U estimates as:
    S T O ^ f r a c = 1 U u = 0 U 1 { Π u }
    with:
    Π u = e ( h u ) w 1 , u e ( h u ) w 1 , u 2 × w 0 , u e ( h u ) w 1 , u e ( h u ) w 1 , u
    h u = ( S T O ^ i n t + a u p m u p u ) mod M
    e ( x ) = e 2 j π x M

5. EVE Blind Synchronization Threat

With this modified preamble structure, E cannot synchronize itself correctly without the knowledge of a u p , a d o w n , m u p and m d o w n . The synchronization error heavily impacts the payload demodulation stage and then prevents E from eavesdropping. In this section, we evaluate the ability of E to blindly estimate synchronization parameters that would possibly threaten the sustainability of our scheme.
As previously stated, C F O f r a c can be blindly estimated by both B and E. However, E cannot synchronize itself if C F O is still present after C F O f r a c correction, i.e., C F O i n t 0 . That is, E has the ability to blindly estimate S T O i n t only if C F O i n t = 0 . This situation may happen if E is a higher-end device with low hardware impairments and, thus, C F O < 1 .
In what follows, we present a blind method to extract S T O i n t . The basic idea is to leverage the fact that the S T O introduces ISI only between the last upchirp and the first downchirp in the preamble. Then, E can use a S T O i n t candidate approach by computing an energy cost for each candidate and selecting the one that minimizes the cost function. We denote each S T O i n t candidate by S T O i n t c a n d { 0 , 1 , , M 1 } . The blind extraction method is designed as follows:
  • E generates a temporary replica of the received frame and voluntarily simulates a S T O with value S T O i n t c a n d by discarding the first R × S T O i n t c a n d samples, consequently modifying the time window process. It is denoted as y c a n d [ k ] .
  • It then dechirps, computes the DFT magnitude of the last preamble upchirp and the first preamble downchirp to derive the following quantities:
    γ u p S T O i n t c a n d = 1 M n = 0 M 1 | Y ˜ c a n d , N u p 2 [ n ] |
    γ d o w n S T O i n t c a n d = 1 M n = 0 M 1 | Y ˜ c a n d , N u p 1 [ n ] |
    To construct the minimum cost function point at S T O i n t c a n d = S T O i n t , E needs to add a left circular permutation of one position to γ u p S T O i n t c a n d . The cost function is simply derived as:
    γ S T O i n t c a n d = γ u p S T O i n t c a n d + γ d o w n S T O i n t c a n d γ S T O i n t c a n d = M 1 = max S T O i n t c a n d γ S T O i n t c a n d
  • S T O i n t is finally estimated as:
    S T O ^ i n t = arg min S T O i n t c a n d γ S T O i n t c a n d
This blind scheme has the drawback of being unable to correctly estimate S T O i n t = M 1 value, slightly increasing the S T O i n t estimation error. Moreover, S T O f r a c progressively increases the estimation error as it gets closer to 0.5, as highlighted in Section 7. If E has correctly estimated S T O i n t , it can easily estimate S T O f r a c even without a u p and m u p knowledge in (36). E can select the DFT bins that are above a given threshold ρ E in Y ˜ u p [ n ] (23) with:
ρ E = λ E × max n | Y ˜ u p [ n ] | , λ E ] 0 ; 1 ]
The derived DFT bin positions set A E should correspond to ( a u p m u p ) mod M and, thus, | A E | = U in high SNR conditions, then enabling an identical S T O f r a c estimation performance to the legitimate receiver if C F O < 1 . In such conditions, E successfully passes the synchronization front-end and can demodulate and retrieve the information in the payload.
We conclude that modification of the preamble only is necessary but not sufficient to ensure a discrete communication. A solution to tackle this more advanced E is then to also modify the payload waveform and is presented in the next section.

6. Combat Advanced LoRa Eavesdropper with Modified Payload Waveform

The payload waveform is modified with the same structure as for the preamble. This has the advantage of reducing scheme knowledge leaks, i.e., preamble symbols a u p , a d o w n , and delays m u p and m d o w n . The modified payload waveform is then:   
s d a t a [ k ] = d = 0 N d 1 s d a t a ( d ) [ k ( N p r e + d ) × M ]
with:
s d a t a ( d ) [ k ] = P J u = 0 U 1 x ( a d a t a ( d ) l d m d a t a d , u ) mod M [ k ]
with l d , a random shift (unknown by E) applied to the d-th payload symbol, m d a t a d , u the u-th relative delay of the d-th payload symbol a d a t a ( d ) . We note m d a t a ( d ) the delay vector of the d-th payload symbol. Each m d a t a ( d ) may be different between payload symbols to improve privacy. Again, the receiver may use the same legacy cross-correlation approach to demodulate the payload symbol. However, the latter has the drawback of increasing interference peak magnitudes in (20) as U grows. This reduces the AWGN immunity and degrades the symbol detection performance.
We propose a modified cross-correlation implementation, denoted as mod cross-corr, that considerably mitigates this detrimental effect. Considering perfect synchronization, it consists of dechirping the received symbol r d a t a ( d ) [ k ] = s d a t a ( d ) [ k ] + w [ k ] over multiple downchirp symbols instead of the unique downchirp x 0 * [ k ] :
r ˜ d a t a ( d ) [ k ] = u = 0 U 1 r d a t a ( d ) [ k ] x ( m d a t a d , u l d ) mod M * [ k ]
The symbol is still estimated in the frequency domain:
a ^ d a t a ( d ) = arg max n | R ˜ d a t a ( d ) [ n ] |
To compare the legacy and the modified cross-correlation, we define the following criterion for the modified cross-correlation:
η m o d c r o s s c o r r = | R ˜ d a t a ( d ) [ a d a t a ( d ) ] | 1 M 1 0 n M 1 n a d a t a ( d ) | R ˜ d a t a ( d ) [ n ] |
and for the legacy cross-correlation:
η c r o s s c o r r = F d a t a ( d ) [ a d a t a ( d ) ] 1 M 1 0 m M 1 m a d a t a ( d ) F d a t a ( d ) [ m ]
This represents the average magnitude difference between the DFT peak of interest and the interference peaks (AWGN plus cross-correlation peaks).
Figure 9 compares average η between the legacy and the modified cross-correlations as a function of S N R d B { 15 , 14 , , 6 } for several U = { 1 , 2 , , 10 } . We assume perfect synchronization and delays chosen randomly, respecting the ϵ constraint.
We can see from the figure that U = 1 has a maximum and same average η between cross-corr and mod cross-corr as it is equivalent to the LoRa legacy demodulation scheme (4). It behaves as an upper limit as the higher average η , the higher the magnitude difference, and the better the performance. We also note that mod cross-corr has much lower U sensitivity. The loss between U = 1 and U = 10 is 6.475 2.023 3.20 for cross-corr against 6.475 5.525 1.17 for mod cross-corr at S N R d B = 6 . This solution is only sustainable if the STO has been correctly mitigated as would normally be the case when demodulating the payload. This modified cross-correlation is not suitable for synchronization parameter estimation as a candidate S T O i n t approach is required (similar to the blind S T O i n t estimation procedure) that gives poor synchronization performance.
Table 2 summarizes the parameters of our complete self-jamming scheme that the legitimate and eavesdropper receivers know, do not know, or must be kept secret from E, estimated with self-jamming scheme knowledge and blindly estimated. The symbols used in the table are described in Table 3. For conciseness, parameters which depend on others are not shown, e.g., M = 2 S F .
Note that, from the table, the only parameter that is identically estimated by the legitimate receiver and the eavesdropper is C F O f r a c . Furthermore, E can blindly estimate the STO and retrieve U under the right conditions (see Section 5). However, the critical payload parameters m d a t a ( d ) and l d are almost impossible to retrieve for E without using a brute-force approach, making proper demodulation very difficult.

7. Simulation Results

In this section, we present several simulation results to assess the self-jamming scheme. The following parameters are used, if not stated:
  • S F = 7 , M = 128
  • N u p = N d o w n = 8
  • L = 3
  • R = 10
  • F c = 868 MHz, B = 125 kHz
  • C F O U [ 0.1 ; M / 4 1 = 31 ]
    We assume that C F O < 0.1 is very unlikely to happen in practice.
  • S T O U [ 0 ; M 1 ]
  • | α | = 1 , ϕ U [ 0 ; 2 π ]
  • P s = 1 , P J = P s / U = 1 / U
  • λ S T O f r a c 0.5 = 0.3
  • ϵ = 5

7.1. Preamble Detection Performance

As E does not have a u p and m u p knowledge, the only possible preamble detection scheme for E is to compute the cross-correlation between two consecutive symbols as:    
F u p , l , E [ m ] = n = 0 M 1 | Y ˜ l [ n ] | | Y ˜ l + 1 [ ( n m ) mod M ] |
n l , E = arg max m F u p , l , E [ m ]
with p l p + ( L 1 ) and p = { 0 , 1 , , p m a x } . E also searches L consecutive symbols in n l , E with value difference ± 1 to detect the preamble.
A and B also have the ability to use the modified cross-correlation to improve the preamble detection performance. However, as stated in Section 6, this approach does not demonstrate satisfactory performance if the S T O is not mitigated. The preamble detection can only be performed in the presence of S T O . That is, an S T O i n t candidate approach must be leveraged with the same philosophy as the blind S T O i n t estimation performed by E (see Section 5). To save computation resources, the candidate selection is only performed on the p-th received symbol and kept for the L 1 remaining symbols. The modified preamble detection scheme is:
  • A or B generates a temporary replica of the received frame and voluntarily simulates an S T O with value S T O i n t c a n d by discarding the first R × S T O i n t c a n d samples, consequently modifying the time window process. It is denoted as y c a n d [ k ] .
  • It then computes the modified cross-correlation of the i-th received symbol and selects the maximum value for each S T O i n t candidate as:
    r ˜ u p , l = p S T O i n t c a n d [ k ] = u = 0 U 1 y c a n d , l = p [ k ] x m u p u * [ k ]
    v m a x , l = p S T O i n t c a n d = max n | R ˜ u p , l = p S T O i n t c a n d [ n ] |
  • The candidate is selected as:
    S T O i n t c a n d , s e l = arg max S T O i n t c a n d v m a x , l = p S T O i n t c a n d
  • It then selects the maximum argument for each computed modified cross-correlation ( p l p + ( L 1 ) ) associated with the chosen candidate:
    n l = arg max n | R ˜ u p , l S T O i n t c a n d = S T O i n t c a n d , s e l [ n ] |
Figure 10 presents the preamble detection performance comparison between the legitimate receiver and E as a function of S N R d B = { 15 , 14 , , 0 } for several U = { 1 , 2 , 3 , 4 , 8 , 10 , 12 } and S F = 7 . We also add the comparison between the legacy and the modified cross-correlation methods.
We can see from the figure that the preamble detection performance progressively decreases when U increases, even when using modified cross-correlation. This is because the same chosen S T O i n t candidate is used for all the symbols in the block of L received symbols. That is, increasing U increases the error probability to S T O i n t c a n d , s e l S T O i n t . This error propagates on all symbols and the probability of detecting L consecutive symbols with value difference ± 1 then decreases.
For U 3 , the legacy and modified cross-correlation schemes have similar preamble detection performance, with a slight advantage for the modified cross-correlation method. However, for higher U, the modified cross-correlation scheme progressively outperforms the legacy cross-correlation scheme as U grows, with a performance difference of about 2 dB and a detection probability of 0.5 and U = 12 . Note that the modified cross-correlation performance is almost the same for U = { 8 , 10 , 12 } .
E has much lower performance with a loss ≈4 dB between U = 1 and U = 12 , with a detection probability of 0.5 and a loss ≥3 dB when compared to the legitimate receiver using the modified cross-correlation scheme, for a given U. E is much more prone to AWGN errors as the cross-correlation performed in (49) has two sources containing AWGN, while the reference upchirp in (20) is AWGN free.

7.2. Complexity Comparison between the Legacy and the Modified Cross-Correlation Methods

The considerably reduced U sensitivity of modified cross-correlation (see Section 6) is at the cost of increased complexity. The algorithms for both the legacy and the modified cross-correlation functions are provided in Algorithms 1 and 2.
Algorithm 1: Legacy cross-correlation algorithm
inputs: r i : the i-th received symbol vector
       m : the delays vector
       x ref : the reference downchirp or upchirp vector
      M: the constellation size
output: s: the maximum peak index of the legacy cross-correlation
1 
R ˜ i : = abs ( FFT ( r i x ref ) )
2 
S ˜ ref : = 0 M        %init M-size vector
3 
S ˜ ref [ m mod M ] : = M P J
4 
F i : = IFFT ( FFT * ( S ˜ ref ) FFT ( R ˜ i ) )
5 
return s = arg max ( F i )
It is obvious that the legacy cross-correlation in Algorithm 1 does not depend on U; it then requires the same amount of operations irrespective of the U. However, in Algorithm 2, lines 2–4, U complex sums of M elements are required. That is, increasing U increases the complexity.
Algorithm 2: Modified cross-correlation algorithm
Sensors 22 07947 i001
This behavior is highlighted in Figure 11. We execute and report the execution times of C compiled versions of Algorithms 1 and 2 in a MATLAB environment, with S F = 7 .
In Figure 11a, the mod cross-corr/legacy cross-corr execution time ratios of the preamble detection and payload demodulation processes are presented for U = { 1 , 2 , , 12 } . We can see for U = 1 and the payload demodulation considered that mod cross-corr is about 30 % faster than legacy cross-corr ( t e x e c r   0.7 ). Indeed, mod cross-corr with U = 1 is identical to the LoRa legacy demodulation scheme in (4). Then, computing the legacy cross-correlation for this case adds unnecessary complexity. Equally, when U = 1 , the S T O i n t candidate procedure for preamble detection presented in Section 7.1 is useless, considerably decreasing the complexity, leading to a ratio 1.04 . Activating the necessary S T O i n t candidate approach for U > 1 greatly increases the complexity cost, reflected in the high ratio transition from 0.7 to 2.8 between U = 1 to U = 2 . Increasing U progressively increases the mod cross-corr complexity to reach a complexity increase factor of about 3 at U = 12 .
In Figure 11b, mod cross-corr and legacy cross-corr schemes are compared to the LoRa legacy demodulation when used for the payload demodulation and preamble detection processes. We note that the burden of mod cross-corr on preamble processing is much higher than that of the payload process for low U values but progressively reduces to reach a turnover point at U = 11 where the latter increases the advantage beyond this value. Again, the S T O i n t candidate approach is responsible for the high cost value at U = 2 but shows less increasing complexity with U. The complexity of mod cross-corr is progressively increased when U increases to reach a factor of about 4.3 at U = 12 .
However, the cost of adding the legacy cross-correlation in the preamble section is very small with a constant ratio 1.05 as the legacy cross-correlation computation does not depend on U. We also note that using legacy cross-corr for the payload demodulation has higher relative complexity (≈1.45) than for the preamble detection although its absolute complexity is much lower.
Table 4 and Table 5 summarize the advantages and drawbacks of the legacy and mod cross-correlation schemes.
From Table 4, we can conclude that mod cross-corr almost completely removes U sensitivity and, thus, improves the frame detection and payload demodulation performances, but at the cost of increased complexity.
Table 5 shows the opposite behavior for legacy cross-corr, where it is more low-complexity compliant but has a high sensitivity with U which decreases the performances. That is, using mod cross-corr for the preamble detection mainly depends on performance–complexity trade-offs.

7.3. Integer STO Part E Blind Estimation Performance

Figure 12 presents the blind S T O i n t estimation performance of E as the average estimation rate (ER) over Monte Carlo trials, defined as:
E R = 1 N t r i a l s t = 0 N t r i a l s 1 E R ( t )
with:
E R ( t ) = 1 if S T O ^ i n t ( t ) = S T O i n t ( t ) 0 else
The figure plots the average ER as a function of S T O f r a c = { 0 , 0.1 , , 0.9 } for random S T O i n t U [ 0 ; M 2 ] , fixed U = 8 , C F O i n t = 0 , two C F O f r a c estimation residuals C F O r = { 0 , 0.02 } in the cases of no AWGN and several S N R d B = { 3 , 0 , 3 , 6 , 9 } , S F = 7 . We also add the legitimate receiver (B in the figure) performance as a comparison where the latter has the S T O f r a c 0.5 case detection activated (see Section 4.4.2), for S N R d B = 3 and C F O f r a c = 0.02 .
We can see from the figure that, in a perfect C F O f r a c estimation scenario, i.e., C F O r = 0 , the average ER degrades progressively as S T O f r a c gets closer to 0.5. In the no AWGN case, E R is very good with E R 0.87 in the worst situation S T O f r a c = 0.5 . Increasing the noise power progressively decreases E R performance with E R 0.15 at S N R d B = 3 .
We can conclude that E only has synchronization capability for very high SNR environments, i.e., located very close to A or B for uplinks and downlinks, respectively. Interestingly, the C F O f r a c estimation residual produces a slightly better performance in no/very low AWGN conditions, i.e., S N R d B = { , 9 , 6 } . With sufficiently low SNR, the noise finally overtakes this effect. Note that higher U values slightly reduce E R performance.
We also see that B has a perfect ER of 1 as the SNR value considered here is high with respect to the traditional SNR range ( S N R d B < 8 usually for S F = 7 ) and then exhibits particularly good performance. Higher SNR values will exhibit identical performance and are not shown for the sake of figure clarity.

7.4. Legitimate Receiver SER Performance

Finally, we evaluate the legitimate receiver SER performance with a fully activated self-jamming scheme, i.e., modified preamble with complete synchronization and a modified cross-correlation method to demodulate payload symbols. The preamble is supposed to be detected already.
Figure 13 presents the SER performance of the legitimate receiver as a function of S N R d B = { 15 , 14 , , 6 } for several U = { 8 , 10 , 12 , 14 , 20 } and S F = 7 . We also add the maximum performance reachable as the perfectly synchronized case with no self-jamming, i.e., U = 1 .
We can see from the figure that U = { 8 , 10 } exhibit very good performance with a loss lower than 0.5 dB. Increasing U progressively degrades performance with a loss of about 3 dB for U = 20 . This can be explained by the fact that the legacy cross-correlation is still used in the synchronization front-end with its U sensitivity (see Section 6), but also because of C F O f r a c estimator limitation. If the preamble DFT peaks are too low, i.e., U 12 , C F O f r a c will not be correctly estimated in a relatively high SNR. That is, the preamble DFT averaging performed straight afterwards will not perform well; C F O i n t and S T O i n t will then be incorrectly estimated, leading to a payload demodulation error. However, the U 10 value is more than sufficient to prevent E from correct demodulating, as explained in the next section.

7.5. E Blind Payload Demodulation Ability

In this subsection, we investigate the ability of E to blindly estimate the payload symbols with the modified payload waveform scheme (see Section 6). We assume that E passed the synchronization front-end successfully with the advantageous but restrained conditions S N R d B 6 and C F O < 1 with low C F O f r a c residual, as seen in Section 7.3. Since m d a t a ( d ) is unknown by E, the latter can only randomly choose one of the DFT magnitude bins that are above a given threshold ρ d a t a ( d ) :
ρ d a t a ( d ) = λ d a t a × max n | S ˜ d a t a ( d ) [ n ] | , λ d a t a ] 0 ; 1 ]
with | S ˜ d a t a ( d ) [ n ] | the DFT magnitude of the d-th payload symbol a d a t a ( d ) . The set of selected DFT bins and its length are denoted with A d a t a and U ^ = | A d a t a | , respectively. For a chance for E to detect correctly a d a t a ( d ) , the latter must be in A d a t a . We denote the probability that a d a t a ( d ) A d a t a as p A d a t a . This necessary condition depends on the λ d a t a value that also drives U ^ . Then, λ d a t a must be chosen appropriately.
Figure 14 presents the impact of λ d a t a on average U ^ (denoted as U ^ ) and p A d a t a , respectively. We consider U = 8 (a value giving very good SER performance for the legitimate receiver, as seen in Section 7.4), S N R d B = { 6 , 7 , 8 , 9 } , C F O < 1 with C F O estimation residual C F O r = 0.02 and random S T O f r a c { 0 , 0.1 , 0.2 , 0.8 , 0.9 } . These S T O f r a c values are the range in which E exhibits very good S T O i n t ER performance, as seen in Figure 12. In the simulation, E blindly estimates S T O i n t [ 0 ; M 2 ] with the scheme presented in Section 5, and next performs the extraction of the DFT peaks with λ E threshold to estimate S T O f r a c . The estimated STO is compensated and E can finally proceed to the payload section of the frame.
From Figure 14a,b, we can see that setting λ d a t a = 0.1 leads to very low p A d a t a as most of the DFT bins are selected, leading to a very high U ^ 70 at S N R d B = 6 . Increasing λ d a t a up to 0.3 decreases U ^ a great deal to reach a floor level U ^ U = 8 . Interestingly, 0.2 λ d a t a 0.7 does not impact p A d a t a so much with 0.02 p A d a t a < 0.1 . λ d a t a > 0.7 exhibits relatively high p A d a t a up to ≈0.6 because of the benefit of a reduced U ^ 4.57 at λ d a t a = 0.9 and S N R d B = 6 . In this example, λ d a t a = 0.3 is a good value to ensure high payload symbol capture in the DFT window of interest, i.e., a d a t a ( d ) A d a t a and U ^ U .
Nevertheless, the demodulation brute-force complexity for E is still prohibitively high. If we consider U ^ = U , assuming that a d a t a ( d ) is always in A d a t a , i.e., p A d a t a = 0 , and payload symbols number N d in the frame, this leads to the frame demodulation probability (FDP) of:
F D P = 1 U N d
For U = 8 and N d = 100 , we have U N d 2.037 × 10 90 combinations and F D P 4.909 × 10 90 . At an optimistic speed of 10 9 combination trials per second, this would require 6.455 × 10 73 years of trials. Therefore, it prevents E from efficient correct demodulation.

8. Conclusions

In this paper, we introduced an enhanced LoRa transceiver that ensures discrete and secure communications by leveraging a simple and elegant spread spectrum philosophy. This involved first modifying the preamble LoRa waveforms to prevent eavesdropper synchronization leading to incorrect payload demodulation.
We proposed a modified synchronization scheme based on current state-of-the-art techniques that estimates and mitigates the major synchronization impairments, such as the CFO, SFO and STO. We added a synchronization refinement by considering the pessimistic case S T O f r a c 0.5 , previously identified in [23], and proposed an approach based on a statistical test.
We also adopted the point of view of the eavesdropper by developing a blind S T O i n t estimation scheme. It exhibits good estimation performance provided that the SNR is much higher than the standard LoRa SNR range, the CFO is low and the received signal is well-aligned with sampling periods. Under these conditions, the eavesdropper is able to perform effective synchronization and finally retrieves the payload information. That is, modification of the preamble waveforms is necessary but not sufficient to ensure a discrete communication.
We then introduced the same modified waveform scheme to the payload but with a modified cross-correlation demodulation scheme to reduce the negative effects of the presence of multiple peaks in the LoRa DFT when using the LoRa legacy cross-correlation, at the cost of increased complexity for the legitimate receiver but much lower than that of the eavesdropper for an arbitrary small frame demodulation error. With the complete transmission scheme enabled, the SER performance loss for the legitimate receiver is less than 0.5 dB for a frequency spread factor up to U = 10 at S F = 7 .
Table 6 summarizes the advantages and drawbacks of our LoRa self-jamming scheme. The main contribution of this scheme compared to other schemes described in the literature is the enablement of both discrete and private LoRa communications by considerably decreasing the eavesdropper’s ability to correctly identify an outgoing LoRa transmission and preventing them from proper demodulation. The potential eavesdropper will also have great difficulty in blindly synchronizing itself and collectingthe most critical system design parameters, i.e., (U, m U , etc.) will only be possible with brute-force approaches. The proposed scheme is, however, not perfect and all of the advantages described are at the cost of higher implementation complexity and SER performance loss that is, however, reasonably small.
Note that this scheme does not interfere with other LoRa physical processing such as coding (e.g., Hamming and Gray coding), whitening and interleaving processes, or with the application layers, such as higher-level encryption mechanisms and LoRaWAN architecture.
From a practical implantation perspective, this scheme would require, at minimum, software modifications of existing LoRa transceivers having higher capabilities (higher computation and memory resources). This scheme may not be suitable for all applications but rather may be used for specific applications (e.g., securing a military area) where complexity constraints are not a priority but the preservation of good AWGN LoRa resilience is desired.
This analytic investigation has generated promising results for a LoRa self-jamming scheme with an adapted synchronization procedure that capitalizes on state-of-the-art LoRa synchronization algorithms. In [22], the authors evaluated the C F O f r a c , C F O i n t and S T O i n t estimators, as well as a variant of our S T O f r a c estimator with universal software radio peripheral (USRP) equipment, and obtained good synchronization performances.
However, this scheme needs to be assessed on real-world equipment. It will be of interest to evaluate the impact of this modified waveform on the different components of the hardware front-end. For example, as this scheme adds multiple LoRa waveforms that are not necessarily coherent with each other, it may result in an increase in the peak-to-average power ratio (PAPR) and, thus, lower the performance. This may be investigated, offering interesting research opportunities for the design of modified LoRa self-jamming waveforms that can mitigate potential PAPR increase.

Author Contributions

Conceptualization, C.D., R.G.; methodology, C.D., R.G. and P.R.; software, C.D.; validation, R.G., P.R.; formal analysis, C.D., R.G. and P.R.; investigation, C.D., R.G. and P.R.; resources, C.D.; data curation, C.D.; writing—original draft preparation, C.D.; writing—review and editing, C.D., R.G., P.R., G.B. and A.F.; visualization, C.D., R.G.; supervision, R.G. and P.R.; project administration, R.G.; funding acquisition, R.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research is jointly supported by the IBNM (Brest Institute of Computer Science and Mathematics), CyberIoT Chair of Excellence at the University of Brest (UBO), and the Brittany region—Pôle d’Excellence Cyber.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank to the University of Brest (UBO), the IBNM (Brest Institute of Computer Science and Mathematics) CyberIoT Chair of Excellence, and the Brittany region—Pôle d’Excellence Cyber for their funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gehani, A.; Harsha, S.; Raghav, R.; Sarkar, M.; Paolini, C. Application of 915 MHz Band LoRa for Agro-Informatics. In Proceedings of the 2021 Wireless Telecommunications Symposium (WTS), Virtual Event, 21–23 April 2021; pp. 1–4. [Google Scholar] [CrossRef]
  2. Opipah, S.; Qodim, H.; Miharja, D.; Sarbini; Hamidi, E.A.Z.; Juhana, T. Prototype Design of Smart Home System Base on LoRa. In Proceedings of the 2020 6th International Conference on Wireless and Telematics (ICWT), Yogyakarta, Indonesia, 3–4 September 2020; pp. 1–5. [Google Scholar] [CrossRef]
  3. Od, S.; Huang, H.H.; Wei, J.B. Apply LoRa Technology to Construct an Air Quality Monitoring IoT System. In Proceedings of the 2021 IEEE 3rd Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS), Tainan, Taiwan, 28–30 May 2021; pp. 88–91. [Google Scholar] [CrossRef]
  4. Demeslay, C.; Gautier, R.; Fiche, A.; Burel, G. Band & Tone Jamming Analysis and Detection on LoRa signals. arXiv 2021, arXiv:2107.07782. [Google Scholar]
  5. Chin-Ya, H.; Ching-Wei, L.; Ray-Guang, C.; Jay, Y.S.; Shiann-Tsong, S. Experimental Evaluation of Jamming Threat in LoRaWAN. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
  6. Aras, E.; Small, N.; Ramachandran, G.S.; Delbruel, S.; Joosen, W.; Hughes, D. Selective Jamming of LoRaWAN Using Commodity Hardware. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2017, Melbourne, Australia, 7–10 November 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 363–372. [Google Scholar] [CrossRef] [Green Version]
  7. Perković, T.; Rudeš, H.; Damjanović, S.; Nakić, A. Low-Cost Implementation of Reactive Jammer on LoRaWAN Network. Electronics 2021, 10, 864. [Google Scholar] [CrossRef]
  8. Hou, N.; Xia, X.; Zheng, Y. Jamming of LoRa PHY and Countermeasure. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications, Virtual, 10–13 May 2021; pp. 1–10. [Google Scholar] [CrossRef]
  9. Danish, S.M.; Qureshi, H.K.; Jangsher, S. Jamming Attack Analysis of Wireless Power Transfer on LoRaWAN Join Procedure. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar] [CrossRef]
  10. Danish, S.M.; Nasir, A.; Qureshi, H.K.; Ashfaq, A.B.; Mumtaz, S.; Rodriguez, J. Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
  11. Martinez, I.; Tanguy, P.; Nouvel, F. On the performance evaluation of LoRaWAN under Jamming. In Proceedings of the 2019 12th IFIP Wireless and Mobile Networking Conference (WMNC), Paris, France, 11–13 September 2019; pp. 141–145. [Google Scholar] [CrossRef]
  12. Martinez, I.; Nouvel, F.; Lahoud, S.; Tanguy, P.; Helou, M.E. On the Performance Evaluation of LoRaWAN with Re-transmissions under Jamming. In Proceedings of the 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, 7–10 July 2020; pp. 1–7. [Google Scholar] [CrossRef]
  13. Ahmar, A.U.H.; Aras, E.; Nguyen, D.T.; Michiels, S.; Joosen, W.; Hughes, D. CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping. In Proceedings of the 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), Marina del Rey, CA, USA, 25–27 May 2020; pp. 95–102. [Google Scholar] [CrossRef]
  14. Tsai, K.L.; Leu, F.Y.; You, I.; Chang, S.W.; Hu, S.J.; Park, H. Low-Power AES Data Encryption Architecture for a LoRaWAN. IEEE Access 2019, 7, 146348–146357. [Google Scholar] [CrossRef]
  15. Zhang, C.; Yue, J.; Jiao, L.; Shi, J.; Wang, S. A Novel Physical Layer Encryption Algorithm for LoRa. IEEE Commun. Lett. 2021, 25, 2512–2516. [Google Scholar] [CrossRef]
  16. Chiani, M.; Elzanaty, A. On the LoRa Modulation for IoT: Waveform Properties and Spectral Analysis. IEEE Internet Things J. 2019, 6, 8463–8470. [Google Scholar] [CrossRef] [Green Version]
  17. Vangelista, L. Frequency Shift Chirp Modulation: The LoRa Modulation. IEEE Signal Process. Lett. 2017, 24, 1818–1821. [Google Scholar] [CrossRef]
  18. Qian, W.; Hai, S.; Kui, R.; Kwangjo, K. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 1422–1430. [Google Scholar] [CrossRef]
  19. Zhang, J.; Duong, T.Q.; Marshall, A.; Woods, R. Key Generation From Wireless Channels: A Review. IEEE Access 2016, 4, 614–626. [Google Scholar] [CrossRef] [Green Version]
  20. Bernier, C.; Dehmas, F.; Deparis, N. Low Complexity LoRa Frame Synchronization for Ultra-Low Power Software-Defined Radios. IEEE Trans. Commun. 2020, 68, 3140–3152. [Google Scholar] [CrossRef] [Green Version]
  21. Ghanaatian, R.; Afisiadis, O.; Cotting, M.; Burg, A. Lora Digital Receiver Analysis and Implementation. In Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 1498–1502. [Google Scholar] [CrossRef]
  22. Tapparel, J.; Afisiadis, O.; Mayoraz, P.; Balatsoukas-Stimming, A.; Burg, A. An Open-Source LoRa Physical Layer Prototype on GNU Radio. In Proceedings of the 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Atlanta, GA, USA, 26–29 May 2020; pp. 1–5. [Google Scholar] [CrossRef]
  23. Xhonneux, M.; Orion, A.; Bol, D.; Louveaux, J. A Low-Complexity LoRa Synchronization Algorithm Robust to Sampling Time Offsets. IEEE Internet Things J. 2021, 9, 3756–3769. [Google Scholar] [CrossRef]
Figure 1. The eavesdropping scenario.
Figure 1. The eavesdropping scenario.
Sensors 22 07947 g001
Figure 2. The legacy LoRa frame format.
Figure 2. The legacy LoRa frame format.
Sensors 22 07947 g002
Figure 3. The modified self-jamming LoRa frame format.
Figure 3. The modified self-jamming LoRa frame format.
Sensors 22 07947 g003
Figure 4. The modified preamble upchirp waveform.
Figure 4. The modified preamble upchirp waveform.
Sensors 22 07947 g004
Figure 5. Illustration of the STO effect.
Figure 5. Illustration of the STO effect.
Sensors 22 07947 g005
Figure 6. Illustration of the LoRa synchronization front-end adapted to the self-jamming scheme.
Figure 6. Illustration of the LoRa synchronization front-end adapted to the self-jamming scheme.
Sensors 22 07947 g006
Figure 7. Evolution of the average value of the criterion δ as a function of S T O f r a c = { 0 , 0.1 , , 0.9 } for several SNR values S N R d B = { 15 , 12 , 9 , 6 } , U = 4 and S F = 7 .
Figure 7. Evolution of the average value of the criterion δ as a function of S T O f r a c = { 0 , 0.1 , , 0.9 } for several SNR values S N R d B = { 15 , 12 , 9 , 6 } , U = 4 and S F = 7 .
Sensors 22 07947 g007
Figure 8. δ histograms as a function of S T O f r a c = { 0 , 0.1 , , 0.5 } for U = 4 , S N R d B = 8 and S F = 7 .
Figure 8. δ histograms as a function of S T O f r a c = { 0 , 0.1 , , 0.5 } for U = 4 , S N R d B = 8 and S F = 7 .
Sensors 22 07947 g008
Figure 9. U sensitivity comparison between the legacy and the modified cross-correlation schemes, S F = 7 .
Figure 9. U sensitivity comparison between the legacy and the modified cross-correlation schemes, S F = 7 .
Sensors 22 07947 g009
Figure 10. Preamble detection performance comparison between B and E for U = { 1 , 2 , 3 , 4 , 8 , 10 , 12 } , S N R d B = { 15 , 14 , , 0 } and S F = 7 . B can use both the legacy and the modified cross-correlation methods, while E is restricted to blindly detecting the preamble with the legacy cross-correlation scheme only.
Figure 10. Preamble detection performance comparison between B and E for U = { 1 , 2 , 3 , 4 , 8 , 10 , 12 } , S N R d B = { 15 , 14 , , 0 } and S F = 7 . B can use both the legacy and the modified cross-correlation methods, while E is restricted to blindly detecting the preamble with the legacy cross-correlation scheme only.
Sensors 22 07947 g010
Figure 11. Complexity comparison for preamble detection and payload demodulation between: (a) mod cross-corr and legacy cross-corr. (b) mod cross-corr and LoRa legacy scheme, legacy cross-corr and LoRa legacy scheme.
Figure 11. Complexity comparison for preamble detection and payload demodulation between: (a) mod cross-corr and legacy cross-corr. (b) mod cross-corr and LoRa legacy scheme, legacy cross-corr and LoRa legacy scheme.
Sensors 22 07947 g011
Figure 12. Blind S T O i n t estimation performance by E as a function of S T O f r a c = { 0 , 0.1 , , 0.9 } , U = 8 , no AWGN and AWGN cases with S N R d B = { 3 , 0 , 3 , 6 , 9 } for the latter and S F = 7 . Legitimate receiver (B) performance is also considered for S N R d B = 3 and C F O f r a c = 0.02 .
Figure 12. Blind S T O i n t estimation performance by E as a function of S T O f r a c = { 0 , 0.1 , , 0.9 } , U = 8 , no AWGN and AWGN cases with S N R d B = { 3 , 0 , 3 , 6 , 9 } for the latter and S F = 7 . Legitimate receiver (B) performance is also considered for S N R d B = 3 and C F O f r a c = 0.02 .
Sensors 22 07947 g012
Figure 13. SER performance of A or B for S N R d B = { 15 , 14 , , 6 } , several self-jamming peaks number U = { 8 , 10 , 12 , 14 , 20 } and S F = 7 with the synchronization front-end activated. The perfect synchronization case is also considered as an optimal performance bound.
Figure 13. SER performance of A or B for S N R d B = { 15 , 14 , , 6 } , several self-jamming peaks number U = { 8 , 10 , 12 , 14 , 20 } and S F = 7 with the synchronization front-end activated. The perfect synchronization case is also considered as an optimal performance bound.
Sensors 22 07947 g013
Figure 14. Eve blind payload demodulation performance as a function of λ d a t a for several SNR values and S F = 7 . (a): Average estimated virtual paths number. (b): Probability of a d a t a ( d ) miss-detection.
Figure 14. Eve blind payload demodulation performance as a function of λ d a t a for several SNR values and S F = 7 . (a): Average estimated virtual paths number. (b): Probability of a d a t a ( d ) miss-detection.
Sensors 22 07947 g014
Table 1. List of principal notations used in the paper.
Table 1. List of principal notations used in the paper.
Notation and Symbols Meaning
global LoRa parameters
SFLoRa spreading factor
Mnumber of possible chirp waveforms per symbol: 2 SF
Tsymbol period
F s sampling frequency
T s sampling period
BLoRa bandwidth
F c carrier frequency
indexes
ktime index
nfrequency index
isymbol index
uvirtual path index
mcross-correlation index
entities
AAlice
BBob
EEve
legacy LoRa frame parameters
N u p number of upchirp pilot symbols
N d o w n number of downchirp pilot symbols
N p r e number of pilot symbols: N u p + N d o w n
N d number of payload symbols
N f total number of symbols: N f = N p r e + N d
acurrent transmitted symbol
x a [ k ] transmitted a-symbol waveform
modified LoRa frame parameters
Unumber of virtual channel paths
a u p upchirp pilot symbol value
a d o w n downchirp pilot symbol value
a d a t a ( d ) d-th payload symbol
m u p vector of virtual channel delays of upchirp pilot symbols
m d o w n vector of virtual channel delays of downchirp pilot symbols
ϵ minimum DFT gap between virtual channel paths
P s total transmit power available
P J power of each virtual channel path: P J = P s / U
S u p [ k ] modified upchirp preamble waveform
S d o w n [ k ] modified downchirp preamble waveform
S d a t a [ k ] modified data waveform
synchronization parameters
τ STO delay
Δ f baseband carrier residual
S T O i n t , S T O f r a c integer and fractional STO part
C F O i n t , C F O f r a c integer and fractional CFO part
Lnumber of preamble upchirps to detect for preamble detection
S ˜ u p r e f [ n ] reference DFT upchirp for synchronization
S ˜ d o w n r e f [ n ] reference DFT downchirp for synchronization
λ S T O f r a c 0.5 threshold for S T O f r a c 0.5 case detection
Roversampling factor for S T O f r a c mitigation
various notations
x averaged x: x = 1 N i = 0 N 1 x i
Table 2. LoRa self-jamming scheme parameters supposed to be known, unknown, kept secret from E, estimated with self-jamming scheme knowledge and blindly estimated by the legitimate or eavesdropper receivers.
Table 2. LoRa self-jamming scheme parameters supposed to be known, unknown, kept secret from E, estimated with self-jamming scheme knowledge and blindly estimated by the legitimate or eavesdropper receivers.
Self-Jamming Scheme ParameterA or BE
LoRa parameters
SF
F c , B
preamble waveform parameters
N u p , N d o w n , N d
a u p , a d o w n
m u p , m d o w n
payload waveform parameters
m d a t a ( d ) , l d
a d a t a ( d )
global self-jamming parameters
U
ϵ
synchronization parameters
L
λ S T O f r a c 0.5
C F O i n t +
C F O f r a c
SFO+
S T O i n t , S T O f r a c
Table 3. Symbols meaning of symbols used in Table 2.
Table 3. Symbols meaning of symbols used in Table 2.
SymbolSymbol Meaning
known
+unknown
kept secret from E
unknown and estimated with self-jamming scheme knowledge
unknown and blindly estimated
Table 4. Advantages and drawbacks of mod cross-corr.
Table 4. Advantages and drawbacks of mod cross-corr.
Advantages
Mitigates U sensitivity
Improves frame detection performance
Improves payload demodulation performance
Drawbacks
Increases the complexity with U
Table 5. Advantages and drawbacks of legacy cross-corr.
Table 5. Advantages and drawbacks of legacy cross-corr.
Advantages
Adds low-complexity burden
Does not increase the complexity with U
Drawbacks
Leads to high sensitivity with U
Reduces frame-detection performance
Reduces synchronization performance
Table 6. Advantages and drawbacks of the LoRa self-jamming scheme.
Table 6. Advantages and drawbacks of the LoRa self-jamming scheme.
Advantages
Enables more discrete LoRa communications
Hides sensitive information from eavesdroppers
Makes design parameter collection difficult for eavesdroppers
Drawbacks
Higher implementation complexity
Reasonably small SER performance loss
Software modifications required on existing LoRa transceivers
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Demeslay, C.; Gautier, R.; Rostaing, P.; Burel, G.; Fiche, A. A Novel Scheme for Discrete and Secure LoRa Communications. Sensors 2022, 22, 7947. https://doi.org/10.3390/s22207947

AMA Style

Demeslay C, Gautier R, Rostaing P, Burel G, Fiche A. A Novel Scheme for Discrete and Secure LoRa Communications. Sensors. 2022; 22(20):7947. https://doi.org/10.3390/s22207947

Chicago/Turabian Style

Demeslay, Clément, Roland Gautier, Philippe Rostaing, Gilles Burel, and Anthony Fiche. 2022. "A Novel Scheme for Discrete and Secure LoRa Communications" Sensors 22, no. 20: 7947. https://doi.org/10.3390/s22207947

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop