Designing Data Communication Security System on LoRA Network Using PRESENT Algorithm
DOI:
https://doi.org/10.61769/telematika.v19i2.674Keywords:
LoRa, RFM95W, ATmega328P, Data Communications Security, PRESENT algorithmAbstract
LoRa is a low-power wireless communication technology capable of transmitting data over long distances. LoRa is widely used in embedded systems and the Internet of Things (IoT) in various sectors, such as agriculture, fisheries, industry, transportation, and smart cities. However, the data transmitted through LoRa is not encrypted, so the confidentiality of the data is not guaranteed because the data can be intercepted and read by hackers at the same frequency. Therefore, data encryption techniques are needed in the LoRa system to maintain data confidentiality when transmitted. In this research, a LoRa system is designed, and an analysis of the lightweight PRESENT block cipher algorithm is carried out to secure data communication on the LoRa system. This research uses a LoRa RFM95W module with a 915 MHz frequency and an ATmega328P microcontroller. This research method consists of the stages of literature study, design, implementation, testing, and analysis. After the design and implementation stages, the LoRa system was tested with data transmission test scenarios with test vectors and data communication interception tests. This research shows that the PRESENT algorithm was successfully implemented on the LoRa communication system, and hackers could not read the data sent from LoRa Tx and Rx. The test results also show that implementing the PRESENT algorithm on the LoRa system does not affect data communication performance based on RSSI values. The results of this research can be used in further research in various fields, such as IoT security in agriculture, fisheries, transportation, industry, and smart cities.
References
A. Kusyanti, R. Primananda, F. A. Bakhtiar, N. Santoso, dan D. A. Rini, “Implementation of lightweight block cipher for IOT Communication Module,” 7th International Conference on Sustainable Information Engineering and Technology 2022, Nov. 2022. doi:10.1145/3568231.3568263
C. Bouras, A. Gkamas, dan S. A. Salgado, “Energy efficient mechanism for lora networks,” Internet of Things, vol. 13, hlm. 100360, 2021. doi:10.1016/j.iot.2021.100360
P. Dani Prasetyo Adi dan A. Kitagawa, “A performance of radio frequency and signal strength of LoRa with BME280 sensor,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 18, no. 2, hlm. 649, Apr. 2020. doi:10.12928/telkomnika.v18i2.14843
P. D. Adi dan Y. Wahyu, “The error rate analyze and parameter measurement on Lora Communication for Health Monitoring,” Microprocessors and Microsystems, vol. 98, hlm. 104820, 2023. doi:10.1016/j.micpro.2023.104820
A. R. Askhedkar, dkk., “Lora communication using TVWS frequencies: Range and data rate,” Future Internet, vol. 15, no. 8, hlm. 270, 2023. doi:10.3390/fi15080270
F. Deng, P. Zuo, K. Wen, dan X. Wu, “Novel soil environment monitoring system based on RFID sensor and Lora,” Computers and Electronics in Agriculture, vol. 169, hlm. 105169, 2020. doi:10.1016/j.compag.2019.105169
L. Moiroux-Arvis, C. Cariou, dan J.-P. Chanet, “Evaluation of lora technology in 433-MHz and 868-mhz for underground to aboveground data transmission,” Computers and Electronics in Agriculture, vol. 194, hlm. 106770, 2022. doi:10.1016/j.compag.2022.106770
W. Hassan, M. Føre, J. B. Ulvund, dan J. A. Alfredsen, “Internet of fish: Integration of acoustic telemetry with LPWAN for efficient real-time monitoring of fish in Marine Farms,” Computers and Electronics in Agriculture, vol. 163, hlm. 104850, 2019. doi:10.1016/j.compag.2019.06.005
Nur-A-Alam, M. Ahsan, Md. A. Based, J. Haider, dan E. M. Rodrigues, “Smart Monitoring and controlling of appliances using Lora based IOT System,” Designs, vol. 5, no. 1, hlm. 17, 2021. doi:10.3390/designs5010017
F. M. Ortiz, T. T. de Almeida, A. E. Ferreira, dan L. H. M.K. Costa, “Experimental vs. Simulation Analysis of lora for vehicular communications,” Computer Communications, vol. 160, hlm. 299–310, 2020. doi:10.1016/j.comcom.2020.06.006
H. Desai, M. Nardello, D. Brunelli, dan B. Lucia, “Camaroptera: A long-range image sensor with local inference for Remote Sensing Applications,” ACM Transactions on Embedded Computing Systems, vol. 21, no. 3, hlm. 1–25, 2022. doi:10.1145/3510850
R. O. Andrade dan S. G. Yoo, “A comprehensive study of the use of Lora in the development of Smart Cities,” Applied Sciences, vol. 9, no. 22, hlm. 4753, 2019. doi:10.3390/app9224753
J. C. Liando, A. Gamage, A. W. Tengourtius, dan M. Li, “Known and unknown facts of Lora,” ACM Transactions on Sensor Networks, vol. 15, no. 2, hlm. 1–35, 2019. doi:10.1145/3293534
F. B. Limas, A. Kusyanti, dan R. Primananda, “The implementaion of Mickey cipher in securing constrained devices based on LoRa,” Proceedings of the 8th International Conference on Sustainable Information Engineering and Technology, Okt. 2023. doi:10.1145/3626641.3627018
E. Erkan, H. Oğraş, dan Ş. Fidan, “Application of a secure data transmission with an effective timing algorithm based on Lora Modulation and Chaos,” Microprocessors and Microsystems, vol. 99, hlm. 104829, 2023. doi:10.1016/j.micpro.2023.104829
M. J. Dworkin, “Advanced encryption standard (AES),” NIST FIPS 197, 2023. doi:10.6028/nist.fips.197-upd1
F. Amelia dan M. F. Ramadhani, “LoRa-based asset tracking system with data encryption using AES-256 algorithm,” 2022 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2022. doi:10.1109/icramet56917.2022.9991210
P. A. Windya, V. Suryani, dan A. A. Wardana, “Sniffing prevention in Lora network using combination of Advanced Encryption Standard (AES) and message authentication code (MAC),” 2021 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS), 2021. doi:10.1109/icadeis52521.2021.9702081
C. Zhang, J. Yue, L. Jiao, J. Shi, dan S. Wang, “A novel physical layer encryption algorithm for Lora,” IEEE Communications Letters, vol. 25, no. 8, hlm. 2512–2516, 2021. doi:10.1109/lcomm.2021.3078669
Atmel Corporation, “ATmega328P Datasheet,” Atmel Corporation
ISO/IEC, “ISO/IEC 29192-2:2019 Information security — Lightweight cryptography — Part 2: Block ciphers,” International Standard, 2019
G. Sravya, Manchalla. O. V. P. Kumar, Y. Sudarsana Reddy, K. Jamal, dan K. Mannem, “The ideal block ciphers - correlation of AES and present in cryptography,” 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020. doi:10.1109/iciss49785.2020.9315883
C. G. Thomas, Research Methodology and Scientific Writing, 2021. doi:10.1007/978-3-030-64865-7
Hope Microelectronics, “RFM95/96/97/98(W) Datasheet – Low Power Long Range Transceiver Module V1.0,” Hoperf Electronic
Arduino, “Product Reference Manual Arduino Nano Datasheet”, Arduino Nano, 2023
A. Bogdanov, dkk., “Present: An ultra-lightweight block cipher,” Cryptographic Hardware and Embedded Systems - CHES 2007 Springer, hlm. 450–466, 2007. doi:10.1007/978-3-540-74735-2_31
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Eka Hero Ramadhani, Asri Wulandari, Alfin Hikmaturokhman

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.