LoRaWAN in Environmental Monitoring: Balancing End-to-End Encryption and Low-Latency Requirements for Real-Time Hazard Alerts
DOI:
https://doi.org/10.63503/j.ijcma.2025.116Keywords:
LoRaWAN, Environmental Monitoring, End-to-End Encryption, Low-Latency Networks, Hazard Alerts, Secure Communications, Real-Time Systems, Wireless Sensor Networks, LPWAN OptimizationAbstract
Environmental hazards that are increasing in number such as floods and wildfires together with toxic gas emissions demand systems for real-time monitoring with secure low-latency communication capabilities. The LoRaWAN version of Low Power Wide Area Networks (LPWANs) presents itself as a compelling choice for extensive environmental monitoring because they offer extended coverage and save energy and scale well. Pursuing excellent end-to-end encryption while maintaining minimal delay times creates essential obstacles for systems designed to warn about hazards. Security measures based on encryption lead to impaired speed in data transfers but weakening these measures can result in unprotected communication of vital data. The success of hazard warning infrastructure requires figuring out how to respond to these operational conflicts. Several design approaches focus on LoRaWAN environmental monitoring system optimization through data rate adjustments and channel priority systems together with low-resource encryption methods. The adjustment of critical network elements through analysis helps achieve faster data transmissions alongside better confidentiality protection at normal resource utilization levels. Multiple network elements including sensor nodes, gateway systems and backhaul networks affect the precise relationship between encryption quality and response speeds during LoRaWAN operations. This research describes an end-to-end LoRaWAN framework which implements encryption optimization together with alert delay reduction using dynamic resource management and network scheduling approaches. The simulated system generates superior results for transmission efficiency alongside superior security measurements when compared to basic platforms. The proposed framework shows its effectiveness for critical environmental monitoring by using quantitative evaluations measuring delay times along with dropped packets and encryption performance measurements.
References
[1] Chilamkurthy, N. S., Pandey, O. J., Ghosh, A., Cenkeramaddi, L. R., & Dai, H. N. (2022). Low-power wide-area networks: A broad overview of its different aspects. Ieee Access, 10, 81926-81959. doi: 10.1109/ACCESS.2022.3196182
[2] Mekki, K., Bajic, E., Chaxel, F., & Meyer, F. (2019). A comparative study of LPWAN technologies for large-scale IoT deployment. ICT express, 5(1), 1-7. https://doi.org/10.1016/j.icte.2017.12.005
[3] Abdalla, M., Bellare, M., & Neven, G. (2010, February). Robust encryption. In Theory of Cryptography Conference (pp. 480-497). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-11799-2_28
[4] Neußner, O. (2021). Early warning alerts for extreme natural hazard events: A review of worldwide practices. International Journal of Disaster Risk Reduction, 60, 102295. https://doi.org/10.1016/j.ijdrr.2021.102295
[5] Arratia, B., Rosas, E., Calafate, C. T., Cano, J. C., Cecilia, J. M., & Manzoni, P. (2024). AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution. Computer Communications, 218, 44-58. https://doi.org/10.1016/j.comcom.2024.02.014
[6] Abboud, S., & Abdoun, N. (2023). Enhancing lorawan security: An advanced aes-based cryptographic approach. IEEE Access, 12, 2589-2606. DOI: 10.1109/ACCESS.2023.3348416
[7] Thabit, F., Alhomdy, S., Al-Ahdal, A. H., & Jagtap, S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings, 2(1), 91-99. https://doi.org/10.1016/j.gltp.2021.01.013
[8] Balaji, K., Rongali, A. S., Archana, N., Sethuraman, G., Mullool, J. M., & Karthi, R. (2024, June). A Critical Analysis of Key Management Techniques in Applied Cryptography. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-5). IEEE. DOI: 10.1109/ICCCNT61001.2024.10724844
[9] Song, Y., & Ye, D. (2023). Multi-channel transmission scheduling with hopping scheme under uncertain channel states. Journal of the Franklin Institute, 360(5), 3800-3824. https://doi.org/10.1016/j.jfranklin.2023.01.025
[10] Abolade, O., Okandeji, A., Oke, A., Osifeko, M., & Oyedeji, A. (2021). Overhead effects of data encryption on TCP throughput across IPSEC secured network. Scientific African, 13, e00855. https://doi.org/10.1016/j.sciaf.2021.e00855
[11] Chaisawat, S., & Vorakulpipat, C. (2021). Towards Achieving Personal Privacy Protection and Data Security on Integrated E‐Voting Model of Blockchain and Message Queue. Security and Communication Networks, 2021(1), 8338616. https://doi.org/10.1155/2021/8338616
[12] Kori, G. S., Kakkasageri, M. S., Chanal, P. M., Pujar, R. S., & Telsang, V. A. (2025). Wireless sensor networks and machine learning centric resource management schemes: A survey. Ad Hoc Networks, 167, 103698. https://doi.org/10.1016/j.adhoc.2024.103698
[13] Mekki, K., Bajic, E., Chaxel, F., & Meyer, F. (2019). A comparative study of LPWAN technologies for large-scale IoT deployment. ICT express, 5(1), 1-7. https://doi.org/10.1016/j.icte.2017.12.005
[14] Hauser, V., & Hégr, T. (2017, August). Proposal of adaptive data rate algorithm for LoRaWAN-based infrastructure. In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 85-90). IEEE. DOI: 10.1109/FiCloud.2017.47
[15] León, J. P. A., Santos, C. L. D., Mezher, A. M., Barrera, J. C., Meng, J., & Guerra, E. C. (2023). Exploring the potential, limitations, and future directions of wireless technologies in smart grid networks: A comparative analysis. Computer Networks, 235, 109956. https://doi.org/10.1016/j.comnet.2023.109956
[16] San Cheong, P., Bergs, J., Hawinkel, C., & Famaey, J. (2017, November). Comparison of LoRaWAN classes and their power consumption. In 2017 IEEE symposium on communications and vehicular technology (SCVT) (pp. 1-6). IEEE. DOI: 10.1109/SCVT.2017.8240313
[17] Villalón-Fonseca, R. (2022). The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity. Computers & Security, 120, 102805. https://doi.org/10.1016/j.cose.2022.102805
[18] Rashidi, B. (2019). High‐throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers. International journal of circuit theory and applications, 47(8), 1254-1268. https://doi.org/10.1002/cta.2645
[19] Schmitz, C., & Pape, S. (2020). LiSRA: Lightweight Security Risk Assessment for decision support in information security. Computers & Security, 90, 101656. https://doi.org/10.1016/j.cose.2019.101656
[20] Rokhideh, M., Fearnley, C., & Budimir, M. (2025). Multi-Hazard Early Warning Systems in the Sendai Framework for Disaster Risk Reduction: Achievements, Gaps, and Future Directions. International Journal of Disaster Risk Science, 1-14.
https://doi.org/10.1007/s13753-025-00622-9
[21] Cotrim, J. R., & Margi, C. B. (2024). Make or Break? How LoRaWAN duty cycle impacts performance in multihop networks. IEEE Access. DOI: 10.1109/ACCESS.2024.3494038
[22] Islam, M. A., Alexandropoulos, G. C., & Smida, B. (2020, June). Simultaneous downlink data transmission and uplink channel estimation with reduced complexity full duplex MIMO radios. In 2020 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1-6). IEEE. DOI: 10.1109/ICCWorkshops49005.2020.9145344
[23] Larrenie, P., Bercher, J. F., Venard, O., & Lahsen-Cherif, I. (2022, October). Low complexity approaches for end-to-end latency prediction. In 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-6). IEEE. DOI: 10.1109/ICCCNT54827.2022.9984543
[24] Yang, B., Wu, Z., Shen, Y., & Jiang, X. (2019). Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control. Computer Networks, 161, 150-161. https://doi.org/10.1016/j.comnet.2019.06.003
[25] Rohan Vaghela, & Jigar Sarda. (2025). Optimized Symmetric Positive Definite Neural Networks: A Novel Approach to Weather Prediction. International Journal on Computational Modelling Applications, 2(1), 1–14. https://doi.org/10.63503/j.ijcma.2025.47
[26] Prakhar Mittal, & Rahul Malik. (2025). Optimized Physics-Informed Neural Network Framework for Wild Animal Activity Detection and Classification with Real Time Alert Message Generation. International Journal on Computational Modelling Applications, 2(1), 42–52. https://doi.org/10.63503/j.ijcma.2025.50