LoRaWAN is a low-power, low-cost wireless technology that can enable secure, highly reliable communications to smart buildings, smart cities, smart agriculture, and more.
Related To: Electronic DesignWhat you’ll learn:
Low-power wireless network (LPWN) technologies such as LoRaWAN (long-range wide area network) and Sigfox help extend the IoT into areas and applications that aren’t practical for 5G services to support. Though their low data rates (250 bits/s to 50 kb/s) and relatively high latency aren’t suitable for some applications, the ability to perform reliably in noisy, congested environments across long distances, while operating for nearly a decade on a single low-voltage battery, make them an excellent solution for many other apps. They include smart agriculture, remote environmental sensing, and monitoring the structural health of bridges, railways, and other critical elements of the national infrastructure (Fig. 1).
Since many of these applications also require low per-node CAPEX/OPEX costs to be feasible, LoRaWAN's open-source specification, use of unlicensed frequency bands, and its ability to leverage existing public networks have helped it gain popularity in many parts of North America, Europe, and elsewhere.
In this article, we'll look at the technologies that underlie the LoRaWAN wireless data standard and a few of the applications it makes possible.
LoRaWAN is a type of low-power wide-area network (LPWAN) that uses open-source technology and transmits over unlicensed frequency bands. It’s based on the LoRa protocol, 1 which is designed to wirelessly connect battery-operated "things" to the internet in regional, national, or global networks. LoRaWAN was also developed specifically to support the key functional requirements of the Internet of Things (IoT), such as bidirectional communications, end-to-end security, mobility, and localization services.
The protocol operates on the globally available sub-1-GHz ISM bands, enabling low-power embedded radios to use very-low-power transceivers to cover large distances with true bidirectional communications. Instead of the frequency-shift-key (FSK) modulation techniques used by many wireless networks, LoRaWAN employs chirp-spread-spectrum (CSS) modulation 2 (Fig. 2a).
CCS modulation maintains the same low-power characteristics as FSK modulation, but it significantly increases the communication range (Fig. 2b). CSS has been proven over decades of use in military and space communication, where its resistance to interference and high coding gain has provided reliable ultra-low communications over long distances.
To further enhance signal integrity, LoRa uses a wide transmission band (typically 125 kHz), which makes it extremely resistant to channel noise, long-term relative frequency, Doppler effects, and fading.
LoRa also adds a unique capability called adaptive data rate (ADR) to increase transmission distance. Geoff Mulligan, creator of the LoRa protocol, explained, "ADR allows the LoRaWAN network to automatically and independently choose the most appropriate output power and data rate for optimal and efficient communications by each device, while controlling the SNR (signal-to-noise ratio) and link budget. Devices that are closer to the base station can transmit at higher data rates, while devices further away transmit at lower rates."
Mulligan added, "This transmission model makes it possible to match the power and speed requirements of a particular application, rather than using a 'one-size-fits-all' approach. By using different ADRs (SF1 through SF12), devices can transmit up to 50 kb/s or over distances up to 20 km with link budgets up to −148 dB. LoRa’s robust link-management scheme enables it to support lower data rates across even larger distances."
Because different applications have different communication requirements, the LoRaWAN specification supports three different "classes" of devices (Fig. 3):
To make the most effective use of its wireless protocol, the LoRa Alliance chose a star-type network topology. It’s similar to the topology used by Wi-Fi networks (with endpoints and access points), with one significant difference: All access points receive messages transmitted by end points (Fig. 4).
That very important difference gives LoRaWAN some unique capabilities. First and foremost, the LoRaWAN protocol makes use of the fact that radio transmissions are "broadcast," meaning many devices can and will receive the transmitted message.
Unlike the unicast messaging protocol used by ZigBee, Bluetooth, and Wi-Fi, the LoRaWAN protocol provides a more robust communication path and eliminates the single points of failure that are common in these other systems. And, by designing in the concept of multiple independent receivers, the LoRaWAN protocol can provide intrinsic support for endpoint geolocation without resorting to power- hungry and expensive GPS radios. Instead, LoRaWAN nodes can apply a technique called time difference of arrival (TDOA) to triangulate the precise location of any endpoint.
Security was a primary consideration during the development of the LoRaWAN protocol. As a result, security and intrusion resistance is baked into its DNA.
The protocol's architecture utilizes two separate AES keys (Advanced Encryption Standard, developed by NIST and adopted by the U.S. government). The first key (the network session key, as seen in Figure 4) is used to protect and secure data during transmission across the LoRaWAN network. The second key (the application session key) is used to protect and secure the data end-to-end from the endpoint to the sensor application.
The purpose for using two distinct keys is to permit devices to roam from one network to another. The network session key is known only to the endpoints and the local network, while the application session key is only known to the endpoint and end-sensor application.
In this way, a device can move from one network to another (roam), and the network can ensure that packets not be intercepted or inserted into the local network (that the network is secure). At the same time, the end device and application can be assured of the data’s confidentiality and integrity, no matter which network is used to transfer the data.
Part 2 of this series looks at how LoRaWAN can be used to bring the intelligence of the IoT to agriculture, commerce, and a wide range of other public infrastructure applications.
2. Umber Noreen, Ahc`ene Bounceur, Laurent Clavier, " A Study of LoRa Low Power and Wide Area Network Technology," ATSIP'2017.
Additional white papers on wireless security, LPWA technology, applications, and other topics may be found on the LoRa Alliance website.