Herunterladen Inhalt Inhalt Diese Seite drucken

Data Transmission Security - WIKA PGW23.100.11 Betriebsanleitung

Rohrfedermanometer mit drahtlosem ausgangssignal
Inhaltsverzeichnis

Werbung

Verfügbare Sprachen

Verfügbare Sprachen

3. Safety
The functionality has been successfully tested with the above-listed antennas.
Using different antennas voids the CE conformity and WIKA assumes no
responsibility.
The antenna must not be extended or shortened.
3.9

Data transmission security

As part of the network join procedure, a mutual authentication between a LoRaWAN
end device and the LoRaWAN
authorised devices are connected to real and authentic networks.
LoRaWAN
applications are origin-authenticated, integrity-protected, replication-protected
®
and encrypted. Combined with mutual authentication, this protection ensures that network
traffic has not been altered, comes from a legitimate device, is not understood by wiretaps,
and has not been intercepted and replayed by unauthorised third parties. In addition,
end-to-end encryption protects the usage data of applications exchanged between end
devices and application servers.
The security mechanisms mentioned are based on the standardised cryptographic AES
algorithms. These algorithms have been analysed by the cryptographic community for
many years, are recognised by NIST and are widely accepted as best security practice
for sensor nodes and networks.
LoRaWAN
security uses the cryptographic principle of AES cryptography in
®
combination with several operating modes: CMAC2 for integrity protection and CTR3
for encryption. Each LoRaWAN
(AppKey) and a globally unique identifier (EUI-64-based DevEUI), both used during the
device authentication process.
Further details can be found in the official LoRaWAN
LoRa
alliance:
®
→ see https://lora-alliance.org/sites/default/files/2019-05/lorawan_security_whitepaper.pdf
The execution of a join request that was not initiated by the operator can be
an indication of a possible weakness in the security system.
WIKA operating instructions, model PGW23.100.11
network is established. This ensures that only real and
®
device is personalised with a unique 128-bit AES key
®
security white paper from the
®
EN
®
15

Werbung

Kapitel

Inhaltsverzeichnis
loading

Inhaltsverzeichnis