TLoRa: Implementing TLS Over LoRa for Secure HTTP Communication in IoT
- URL: http://arxiv.org/abs/2510.02519v1
- Date: Thu, 02 Oct 2025 19:47:03 GMT
- Title: TLoRa: Implementing TLS Over LoRa for Secure HTTP Communication in IoT
- Authors: Atonu Ghosh, Akhilesh Mohanasundaram, Srishivanth R F, Sudip Misra,
- Abstract summary: TLoRa is an end-to-end architecture for HTTPS communication over LoRa.<n>It enables a seamless and secure communication channel between WiFi-enabled end devices and the Internet over LoRa.
- Score: 13.530498941051677
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: We present TLoRa, an end-to-end architecture for HTTPS communication over LoRa by integrating TCP tunneling and a complete TLS 1.3 handshake. It enables a seamless and secure communication channel between WiFi-enabled end devices and the Internet over LoRa using an End Hub (EH) and a Net Relay (NR). The EH tethers a WiFi hotspot and a captive portal for user devices to connect and request URLs. The EH forwards the requested URLs to the NR using a secure tunnel over LoRa. The NR, which acts as a server-side proxy, receives and resolves the request from the Internet-based server. It then relays back the encrypted response from the server over the same secure tunnel. TLoRa operates in three phases -session setup, secure tunneling, and rendering. In the first phase, it manages the TCP socket and initiates the TLS handshake. In the second, it creates a secure tunnel and transfers encrypted TLS data over LoRa. Finally, it delivers the URL content to the user. TLoRa also implements a lightweight TLS record reassembly layer and a queuing mechanism for session multiplexing. We evaluate TLoRa on real hardware using multiple accesses to a web API. Results indicate that it provides a practical solution by successfully establishing a TLS session over LoRa in 9.9 seconds and takes 3.58 seconds to fulfill API requests. To the best of our knowledge, this is the first work to comprehensively design, implement, and evaluate the performance of HTTPS access over LoRa using full TLS.
Related papers
- SHINE: A Scalable In-Context Hypernetwork for Mapping Context to LoRA in a Single Pass [55.28352410490407]
SHINE is a scalable hypernetwork that can map diverse meaningful contexts into high-quality LoRA adapters for large language models (LLM)<n>We introduce a pretraining and instruction fine-tuning pipeline, and train our hypernetwork to generate high quality LoRA adapters in a single forward pass.<n>Our work achieves outstanding results on various tasks, greatly saves time, computation and memory costs compared to SFT-based LLM adaptation, and shows great potential for scaling.
arXiv Detail & Related papers (2026-02-06T03:40:31Z) - RollArt: Scaling Agentic RL Training via Disaggregated Infrastructure [49.88201789074532]
Agentic Reinforcement Learning (RL) enables Large Language Models (LLMs) to perform autonomous decision-making and long-term planning.<n>We present RollArc, a distributed system designed to maximize throughput for multi-task agentic RL on disaggregated infrastructure.
arXiv Detail & Related papers (2025-12-27T11:14:23Z) - LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3 [6.262801814917709]
LURK-T is a provably secure framework which allows for limited use of remote keys with added trust in TLS 1.3.<n>We efficiently decouple the server side of TLS 1.3 into a LURK-T Crypto Service (CS) and a LURK-T Engine (E)<n>CS executes all cryptographic operations in a Trusted Execution Environment (TEE)<n>We show that, from a TLS-client's perspective, HTTPS servers using LURK-T instead a traditional TLS-server have no noticeable overhead when serving files greater than 1MB.
arXiv Detail & Related papers (2025-05-21T15:23:17Z) - Fundamental Limits of Hierarchical Secure Aggregation with Cyclic User Association [93.46811590752814]
Hierarchical secure aggregation is motivated by federated learning (FL)<n>In this paper, we consider HSA with a cyclic association pattern where each user is connected to $B$ consecutive relays.<n>We propose an efficient aggregation scheme which includes a message design for the inputs inspired by gradient coding.
arXiv Detail & Related papers (2025-03-06T15:53:37Z) - Extending Internet Access Over LoRa for Internet of Things and Critical Applications [0.8192907805418583]
ILoRa enables accessing Application Programming Interfaces (APIs) and web pages on the Internet over a LoRa backbone network.<n>This work proposes and implements ILoRa to extend the public Internet to disconnected areas for essential service delivery.
arXiv Detail & Related papers (2025-01-07T01:47:49Z) - LoRaConnect: Unlocking HTTP Potential on LoRa Backbones for Remote Areas and Ad-Hoc Networks [26.152275462641168]
We propose LoRaConnect to enable HTTP access over LoRa.<n>LoRaWeb hardware tethers a WiFi hotspot to which client devices connect and access HTTP resources over LoRa.<n>LoRaWeb achieves an average throughput of 1.18 KB/S approximately, with an access delay of only 1.3 S approximately for a 1.5KB webpage.
arXiv Detail & Related papers (2025-01-05T07:41:53Z) - A Comprehensive Review of TLSNotary Protocol [0.0]
We investigate the TLSNotary protocol, which aim to enable the Client to obtain proof of provenance for data from TLS session.
To achieve such proofs without any Server-side adjustments or permissions, the power of secure multi-party computation (MPC) together with zero knowledge proofs is used.
arXiv Detail & Related papers (2024-09-26T09:28:51Z) - TurboTLS: TLS connection establishment with 1 less round trip [2.307447796778038]
We show how to establish TLS connections using one less round trip.
In our approach, which we call TurboTLS, the initial client-to-server and server-to-client flows of the TLS handshake are sent over UDP rather than TCP.
arXiv Detail & Related papers (2023-02-10T15:16:16Z) - NASiam: Efficient Representation Learning using Neural Architecture
Search for Siamese Networks [76.8112416450677]
Siamese networks are one of the most trending methods to achieve self-supervised visual representation learning (SSL)
NASiam is a novel approach that uses for the first time differentiable NAS to improve the multilayer perceptron projector and predictor (encoder/predictor pair)
NASiam reaches competitive performance in both small-scale (i.e., CIFAR-10/CIFAR-100) and large-scale (i.e., ImageNet) image classification datasets while costing only a few GPU hours.
arXiv Detail & Related papers (2023-01-31T19:48:37Z) - LAMDA-SSL: Semi-Supervised Learning in Python [56.14115592683035]
LAMDA-SSL is open-sourced on GitHub and its detailed usage documentation is available at https://ygzwqzd.github.io/LAMDA-SSL/.
This documentation greatly reduces the cost of familiarizing users with LAMDA-SSL toolkit and SSL algorithms.
arXiv Detail & Related papers (2022-08-09T09:06:48Z) - Music Generation Using an LSTM [52.77024349608834]
Long Short-Term Memory (LSTM) network structures have proven to be very useful for making predictions for the next output in a series.
We demonstrate an approach of music generation using Recurrent Neural Networks (RNN)
We provide a brief synopsis of the intuition, theory, and application of LSTMs in music generation, develop and present the network we found to best achieve this goal, identify and address issues and challenges faced, and include potential future improvements for our network.
arXiv Detail & Related papers (2022-03-23T00:13:41Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.