- When using the command-line interface (CLI), a configuration file?with Join Server only. See?The Things Join Server.
- JoinEUI/AppEUI is either issued from a IEEE block that you own, or set to?
- DevEUIs are issued from a IEEE block that you own.
- Root keys are generated randomly per device.
Learn more about?obtaining a IEEE MAC Address Block?for JoinEUI/AppEUI and DevEUIs.
I’m trying to understand the three magic LoRaWAN IDs from the?LoRaWAN 1.2 specification. My understanding is:
DevEUI?is like a MAC address
AppKey?is like a public key (roughly…)
AppEUI?is like a port number
Now I’m having problem understanding?who?is responsible for creating these IDs:
DevEUI?can be generated from the LoRa chip internal ID registers (I’m using Murata’s type ABZ chip)
AppKey: should it be unique for each end node? Should I choose a random one or ask one from the LoRaWAN provider (e.g.?Objenious)?
AppEUI: should be common to each end node (I guess it should)? Should I choose a random one or ask one from the LoRaWAN provider?
The DevEUI is an ID in the IEEE EUI64 address space used to identify a device. It is supplied by the device manufacturer. A deprecated algorithm exists to convert 48bit MAC addresses to EUI64. For MAC addresses with 6 bytes (e.g. 01 02 03 04 05 06) put ff fe or ff fe in the middle (e.g. 01 02 03 ff fe 04 05 06). This algorithm has been deprecated as it may lead to?collisions?with other DevEUIs. During over the air activation a DevAddr is assigned to the device. This DevAddr is used in the LoRaWAN protocol afterwards. The DevEUI is sent unencrypted.
The JoinEUI (formerly called AppEUI) is a global application ID in the IEEE EUI64 address space identifying the join server during the over the air activation. For non-private networks it corresponds to a subdomain of joineuis.lora-alliance.org. This server name is used to find the IP address of the join server via DNS. This is described in?LoRaWAN? Back-End Interfaces v1.0.
AppKey is the encryption key used for messages during every over the air activation. After the activation the AppSKey is used. A listener knowing the AppKey can derive the AppSKey. So you want to keep the AppKey secret. Which side of the communication channel creates it is not important. You simply want to be sure that it is random.
Thanks. Who is generating the JoinEUI/AppEUI? Is it me or the LoRaWAN network provider? I heard I should ask for a kind of OUI range to IEEE for that…
Jan 9 ’19 at 22:52
As the JoinEUI identifies the join server it can only be provided by the owner of the join server.–?Xypron
Jan 10 ’19 at 0:15
Ok, that’s clear. So I should register to IEEE for the DevEUI or use the ID from the LoRa chip manufacturer?
Jan 10 ’19 at 8:24
As the DevEui is not relevant for encryption and the one supplied by the manufacturer is globally unique I would stay with that one.–?Xypron
Jan 11 ’19 at 18:41
thanks for confirming that. As I now have enough rep to upvote, +1 from me
Jan 14 ’19 at 10:03
The?DevEUI?is a global end device ID in IEEE EUI64 address space that uniquely identifies the end device.
The user can derive their own DevEUI
AES128?root key specific to the end device. Whenever an end device joins a network via over the air activation(OAT), the?AppKey?is used to derive the session keys?
AppSKey?specific for that end device to encrypt and verify network communication and application data.
The AppKey should be unique for each device.The user can derive their own AppKey
The?AppEUI?is a global application ID in IEEE EUI64 address space that uniquely identifies the entity able to process the JoinReq frame. The?AppEUI?is stored in the end-device before the activation procedure is executed
The AppEUI can be different for each device or it can also be same for all device. It also depends on what kind of application server you are using.
For example in?loraserver.io?you can have unique AppKey,AppEUI and DevEUI but in?TheThingsNetwork?you can register many devices for one application or AppEUI. But note that AppKey and DevEUI should always be unique for each end node.
I understand that the join server provides the AppEUI and that the end node device includes this in the join request. But if I buy a off the shelf LoRa device, how do I get the AppEUI into that device?
Oct 17 ’19 at 8:59
DevEUI, AppEUI (JoinEUI) and AppKey #
Updated:?Dec 10, 2018
This post describes what DevEUI, AppEUI (JoinEUI) and AppKey are, using online sources and the relevant sections for the LoRaWAN? Specification v1.1 and v1.0.3
From LoRa Community Answers “DevEui vs AppEui”:
(1) DevEUI – 64 bit number ?
This is the unique ID of the end device. To make sure it is unique, the node manufacturer should contact the IEEE to obtain a range of unique addresses.
(19) AppEUI – 64 bit number (in v1.1 “AppEUI is renamed JoinEUI”
This is the unique ID of the Application server. The (19) AppEUI is also unique and should be obtained from the IEEE. This is the destination of the messages sent by the nodes. The (19) AppEUI is unique to the Application Server and each Application Server will have its own (19) AppEUI.
(21) AppKey – 128 bit number
The (21) AppKey is the encryption key between the source of the message (behind the DevEUI) and the destination of the message (behind the AppEUI). This key must be unique for each device.
How to get them:
(1) DevEUI: this key is linked to the end node, this means end node manufacturers should contact the IEEE to get a range of unique identifiers.
(19) AppEUI: this key is linked to the Application Server. It must be unique so that end node World Wide (we will have roaming soon) know where to send their messages. The AppEUI is usually provided to the end node manufacturers by the solution providers (who “own” the Application Server).
(21) AppKey: The AppKey is the data encryption key used to “encode” the messages between the end nodes and the Application Server. The AppKey is typically a random generated number who is programmed into the end nodes and also communicated to the Application server (so that it can decode the messages).
(1) DevEUI – Device Extended Unique Identifier
From the LoRaWAN Spec v1.1 line 1323 section 220.127.116.11:
The (1) DevEUI is a global end-device ID in IEEE (2) EUI64 address space that uniquely identifies the end-device.
DevEUI is the recommended unique device identifier by Network Server(s), whatever activation procedure is used, to identify a device roaming across networks.
For (3) OTAA devices, the DevEUI MUST be stored in the end-device before the Join procedure is executed. (4) ABP devices do not need the DevEUI to be stored in the device itself, but it is RECOMMENDED to do so.
Note: It is a recommended practice that the DevEUI should also be available on a device label, for device administration.
(1) EUI64 stands for 64-bit Extended Unique Identifier and is written EUI-64 by the IEEE
To participate in a LoRaWAN network, each end-device has to be personalized and activated. There are two types of activation: (3) OTAA, which stands for Over-The-Air Activation and (4) ABP which stands for Activation By Personalization.
From the LoRaWAN Spec v1.1 line 1481 section 6.2:
For over-the-air activation, end-devices must follow a (5) join procedure prior to participating in data exchanges with the (6) Network Server. An end-device has to go through a new (5) join procedure every time it has lost the (7) session context information.
Acronyms and More Info
(5) join procedure from an end-device’s point of view, the (5) join procedure consists of either a (9) Join-request or (10) ReJoin-request and a (11) Join-accept exchange.
From the LoRaWAN Spec v1.1 line 1501 section 6.2.2:
The join procedure is always initiated from the end-device by sending a join-request message
The join-request message contains the (20) JoinEUI and (1) DevEUI of the end-device followed by a nonce of 2 octets ((21) DevNonce).
(21) DevNonce is a counter starting at 0 when the device is initially powered up and incremented with every (9) Join-request. A (21) DevNonce value SHALL NEVER be reused for a given (20) JoinEUI value. If the end-device can be power-cycled then (21) DevNonce SHALL be persistent (stored in a non-volatile memory). Resetting DevNonce without changing (20) JoinEUI will cause the (6) Network Server to discard the (9) Join-requests of the device. For each end-device, the (6) Network Server keeps track of the last (21) DevNonce value used by the end-device, and ignores Join-requests if (21) DevNonce is not incremented.
The message integrity code (MIC) value (see Chapter 4 for MAC message description) for a (9) join-request message is calculated as follows:
cmac = aes128_cmac(NwkKey, MHDR | JoinEUI | DevEUI | DevNonce) MIC = cmac[0..3]
The (9) join-request message is not encrypted. (9) The join-request message can be transmitted using any data rate and following a random frequency hopping sequence across the specified join channels. It is RECOMMENDED to use a plurality of data rates. The intervals between transmissions of (9) Join-Requests SHALL respect the condition described in chapter 7 (a random retry). For each transmission of a Join-request, the end-device SHALL increment the (21) DevNonce value.
(6) Network Server
From the LoRaWAN Spec v1.1 line 285 section 1:
LoRaWAN networks typically are laid out in a star-of-stars topology in which (12) gateways relay messages between (13) end-devices and a central (6) Network Server. The (6) Network Server routes the packets from each device of the network to the associated (14) Application Server.
Acronyms and More Info
(12) gateways are also known as concentrators or base stations
(13) end-devices are also known as motes
(7) Session Context
From the LoRaWAN Spec v1.1 line 1488 section 18.104.22.168
(7) Session Context contains (15) Network Session and (16) Application Session.
The (15) Network Session consists of the following state:
FCntDwn (LW 1.0) or NFCntDwn (LW 1.1)
The (16) Application Session consists of the following state:
FCntDown (LW 1.0) or AFCntDwn (LW 1.1)
(15) Network Session state is maintained by the (17) NS and the end-device. (16) Application Session state is maintained by the (18) AS and the end-device.
Acronyms and More Info
(17) NS stands for Network Server (defined in LoRaWAN Backend Interfaces)
(18) AS stands for Application Server (defined in LoRaWAN Backend Interfaces)
(19) AppEUI – Application identifier in v1.0.3 and (20) JoinEUI in v1.1
Note: In LoRaWAN 1.1, AppEUI was renamed JoinEUI. The AppEUI/JoinEUI signals the network-server which join-server to use to authenticate the (9) Join-request.
From the LoRaWAN Spec v1.0.3 line 923 section 6.1.2:
The (19) AppEUI is a global application ID in IEEE EUI64 address space that uniquely identifies the entity able to process the JoinReq frame.
The (19) AppEUI is stored in the end-device before the activation procedure is executed.
From the LoRaWAN Spec v1.1 line 1317 section 22.214.171.124:
The (2) JoinEUI is a global application ID in IEEE EUI64 address space that uniquely identifies the Join Server that is able to assist in the processing of the Join procedure and the session keys derivation.
For OTAA devices, the JoinEUI MUST be stored in the end-device before the (5) Join procedure is executed. The (20) JoinEUI is not required for ABP only end-devices
(21) AppKey – Application key
From the LoRaWAN Spec v1.0.3 line 961 section 6.2.3:
The (21) AppKey is an AES-128 root key specific to the end-device (since all end-devices end up with unrelated application keys specific for each end-device, extracting the (21) AppKey from an end-device only compromises this one end-device). Whenever an end-device joins a network via over-the-air activation, the (21) AppKey is used to derive the session keys (22) NwkSKey and (23) AppSKey specific for that end-device to encrypt and verify network communication and application data.
(22) NwkSKey – Network session key
From the LoRaWAN Spec v1.0.3 line 927 section 6.1.3:
The (22) NwkSKey is a network session key specific for the end-device. It is used by both the network server and the end-device to calculate and verify the (24) MIC (message integrity code) of all data messages to ensure data integrity. It is further used to encrypt and decrypt the payload field of a (25) MAC-only data messages.
(23) AppSKey – Network session key
From the LoRaWAN Spec v1.0.3 line 932 section 6.1.4:
The (23) AppSKey is an application session key specific for the end-device. It is used by both the application server and the end-device to encrypt and decrypt the payload field of application-specific data messages. Application payloads are end-to-end encrypted between the end-device and the application server, but they are not integrity protected. That means, a network server may be able to alter the content of the data messages in transit. Network servers are considered as trusted, but applications wishing to implement end-to-end confidentiality and integrity protection are recommended to use additional end-to-end security solutions, which are beyond the scope of this specification.
(24) MIC – Message integrity code
The message integrity code (MIC) is calculated over all the fields in the message.
msg = (26) MHDR | (27) FHDR | (28) FPort | (29) FRMPayload
whereby len(msg) denotes the length of the message in octets. The MIC is calculated as follows [RFC4493 (link)]: cmac = aes128_cmac(NwkSKey, B0 | msg) MIC = cmac[0..3]
whereby the block B0 is defined as follows:
The direction field (Dir) is 0 for uplink frames and 1 for downlink frames.
(25) MAC-only data messages
(26) MHDR – MAC header
From the LoRaWAN Spec v1.0.3 line 380 section 4.2:
The MAC header specifies the message type ( (30) MType ) and according to which major version ( (32) Major ) of the frame format of the LoRaWAN layer specification the frame has been encoded.
(27) FHDR – Frame header
From the LoRaWAN Spec v1.0.3 line 415 section 4.3.1:
The (27) FHDR contains the short device address of the end-device ((33) DevAddr), a frame control octet ((34) FCtrl), a 2-octets frame counter ((35) FCnt), and up to 15 octets of frame options ((36) FOpts) used to transport MAC commands.
(33) DevAddr – End-device address
The (33) DevAddr consists of 32 bits identifies the end-device within the current network. Its format is as follows:
The most significant 7 bits are used as network identifier ((44) NwkID) to separate addresses of territorially overlapping networks of different network operators and to remedy roaming issues. The least significant 25 bits, the network address ((45) NwkAddr) of the end-device, can be arbitrarily assigned by the network manager.
(44) NwkID – network identifier
From the LoRaWAN Spec v1.0.3 line 916 section 6.1.1:
(45) NwkAddr – network address
From the LoRaWAN Spec v1.0.3 line 916 section 6.1.1:
(34) FCtrl – frame control pctet
For downlink frames the (34) FCtrl content of the frame header is:
For uplink frames the (34) FCtrl content of the frame header is:
(35) FCnt, FCntUp, FCntDown
From the LoRaWAN Spec v1.0.3 line 507 section 126.96.36.199:
Each end-device has two frame counters to keep track of the number of data frames sent
uplink to the network server (FCntUp), incremented by the end-device and received by the
end-device downlink from the network server (FCntDown), which is incremented by the
network server. The network server tracks the uplink frame counter and generates the
downlink counter for each end-device. After a JoinReq – JoinAccept message exchange or a
reset for a personalized end-device, the frame counters on the end-device and the frame
counters on the network server for that end-device are reset to 0. Subsequently FCntUp and
FCntDown are incremented at the sender side by 1 for each new data frame sent in the
respective direction. At the receiver side, the corresponding counter is kept in sync with the
value received provided the value received has incremented compared to the current counter value and is less than the value specified by MAX_FCNT_GAP1 after considering counter rollovers. If this difference is greater than the value of MAX_FCNT_GAP then too many data frames have been lost then subsequent will be discarded. The FCnt is not incremented in case of multiple transmissions of an unconfirmed frame (see NbTrans parameter), or in the case of a confirmed frame that is not acknowledged.
The LoRaWAN allows the use of either 16-bits or 32-bits frame counters. The network side
needs to be informed out-of-band about the width of the frame counter implemented in a given end-device. If a 16-bits frame counter is used, the FCnt field can be used directly as the counter value, possibly extended by leading zero octets if required. If a 32-bits frame counter is used, the FCnt field corresponds to the least-significant 16 bits of the 32-bits frame counter (i.e., FCntUp for data frames sent uplink and FCntDown for data frames sent downlink). The end-device SHALL not reuse the same FCntUp value, except for retransmission, with the same application and network session keys
Note: Since the FCnt field carries only the least-significant 16 bits of the 32-bits frame counter, the server must infer the 16 most-significant bits of the frame counter from the observation of the traffic.
(36) FOpts, FOptsLen
From the LoRaWAN Spec v1.0.3 line 534 section 188.8.131.52:
The frame-options length field (FOptsLen) in FCtrl byte denotes the actual length of the frame options field (FOpts) included in the frame.
FOpts transport MAC commands of a maximum length of 15 octets that are piggybacked onto data frames; see Chapter 5 for a list of valid MAC commands
If FOptsLen is 0, the FOpts field is absent. If FOptsLen is different from 0, i.e. if MAC commands are present in the FOpts field, the port 0 cannot be used (FPort MUST be either not present or different from 0).
MAC commands cannot be simultaneously present in the payload field and the frame options field. Should this occur, the device SHALL ignore the frame.
(37) ADR – Adaptive Data Rate, ADRACKReq
From the LoRaWAN Spec v1.0.3 line 422 section 184.108.40.206:
LoRa network allows the end-devices to individually use any of the possible data rates. This feature is used by the LoRaWAN to adapt and optimize the data rate of static end-devices. This is referred to as Adaptive Data Rate (ADR) and when this is enabled the network will be optimized to use the fastest data rate possible.
Adaptive Data Rate control may not be possible when the radio channel attenuation changes fast and constantly. When the network is unable to control the data rate of a device, the device’s application layer should control it. It is recommended to use a variety of different data rates in this case. The application layer should always try to minimize the aggregated air time used given the network conditions.
If the ADR bit is set, the network will control the data rate of the end-device through the appropriate MAC commands. If the ADR bit is not set, the network will not attempt to control the data rate of the end-device regardless of the received signal quality. The ADR bit MAY be set and unset by the end-device or the Network on demand. However, whenever possible, the ADR scheme should be enabled to increase the battery life of the end-device and maximize the network capacity.
Note: Even mobile end-devices are actually immobile most of the time. So depending on its state of mobility, an end-device can request the network to optimize its data rate using ADR.
If an end-device whose data rate is optimized by the network to use a data rate higher than its lowest available data rate, it periodically needs to validate that the network still receives the uplink frames. Each time the uplink frame counter is incremented (for each new uplink, repeated transmissions do not increase the counter), the device increments an ADR_ACK_CNT counter. After ADR_ACK_LIMIT uplinks (ADR_ACK_CNT >= ADR_ACK_LIMIT) without any downlink response, it sets the ADR acknowledgment request bit (ADRACKReq). The network is required to respond with a downlink frame within the next ADR_ACK_DELAY frames, any received downlink frame following an uplink frame resets the ADR_ACK_CNT counter. The downlink ACK bit does not need to be set as any response during the receive slot of the end-device indicates that the gateway has still received the uplinks from this device. If no reply is received within the next ADR_ACK_DELAY uplinks (i.e., after a total of ADR_ACK_LIMIT + ADR_ACK_DELAY), the end-device MAY try to regain connectivity by switching to the next lower data rate that provides a longer radio range. The end-device will further lower its data rate step by step every time ADR_ACK_DELAY is reached. The ADRACKReq SHALL not be set if the device uses its lowest available data rate because in that case no action can be taken to improve the link range.
Note: Not requesting an immediate response to an ADR acknowledgement request provides flexibility to the network to optimally schedule its downlinks.
Note: In uplink transmissions the ADRACKReq bit is set if ADR_ACK_CNT >= ADR_ACK_LIMIT and the current data-rate is greater than the device defined minimum data rate, it is cleared in other conditions.
(39) ACK in FCtrl – acknowledgment bit
From the LoRaWAN Spec v1.0.3 line 465 section 220.127.116.11:
(ACK in FCtrl)
When receiving a confirmed data message, the receiver SHALL respond with a data frame that has the acknowledgment bit (ACK) set. If the sender is an end-device, the network will send the acknowledgement using one of the receive windows opened by the end-device after the send operation. If the sender is a gateway, the end-device transmits an acknowledgment at its own discretion.
Acknowledgements are only sent in response to the latest message received and are never retransmitted.
Note: To allow the end-devices to be as simple as possible and have as few states as possible it may transmit an explicit (possibly empty) acknowledgement data message immediately after the reception of a data message requiring a confirmation. Alternatively the end-device may defer the transmission of an acknowledgement to piggyback it with its next data message.
(40) FPending in FCtrl, downlink only – frame pending bit
From the LoRaWAN Spec v1.0.3 line 502 section 18.104.22.168:
The frame pending bit ((40) FPending) is only used in downlink communication, indicating that the gateway has more data pending to be sent and therefore asking the end-device to open another receive window as soon as possible by sending another uplink message.
The exact use of (40) FPending bit is described in Chapter 18.3.
(43) Class B
From the LoRaWAN Spec v1.0.3 line 1092 section 8:
Paraphrase: enables synchronous network initiated downlink, i.e. LoRaWAN Class B option adds a synchronized reception window on the end-device.
(28) FPort – Port field
From the LoRaWAN Spec v1.0.3 line 544 section 4.3.2:
If the frame payload field is not empty, the port field MUST be present. If present, an (28) FPort value of 0 indicates that the FRMPayload contains MAC commands only; see Chapter 4.4 for a list of valid MAC commands. (28) FPort values 1..223 (0x01..0xDF) are application-specific. (28) FPort value 224 is dedicated to LoRaWAN Mac layer test protocol.
(28) FPort values 225..255 (0xE1..0xFF) are reserved for future standardized application extensions.
N is the number of octets of the application payload. The valid range for N is region specific and is defined in the “LoRaWAN regional physical layer specification” document.
N should be equal or smaller than:
N ≤ M – 1 – (length of FHDR in octets)
where M is the maximum MAC payload length.
(29) FRMPayload – MAC Frame Payload Encryption
From the LoRaWAN Spec v1.0.3 line 574 section 4.3.3:
If a data frame carries a payload, FRMPayload MUST be encrypted before the message integrity code (MIC) is calculated.
The encryption scheme used is based on the generic algorithm described in IEEE 802.15.4/2006 Annex B [IEEE802154] using AES with a key length of 128 bits.
The key K used depends on the FPort of the data message:
The fields encrypted are:
pld = FRMPayload
For each data message, the algorithm defines a sequence of Blocks Ai for i = 1..k with k = ceil(len(pld) / 16):
The direction field (Dir) is 0 for uplink frames and 1 for downlink frames.
The blocks Ai are encrypted to get a sequence S of blocks Si:
Si = aes128_encrypt(K, Ai) for i = 1..k
S = S1 | S2 | .. | Sk
Encryption and decryption of the payload is done by truncating
(pld | pad16) xor S
to the first len(pld) octets.
From the LoRaWAN Spec v1.0.3 line 385 section 4.2.1:
The LoRaWAN distinguishes between six different MAC message types: join request, join accept, unconfirmed data up/down, and confirmed data up/down.
(32) Major – Major version of data message
From the LoRaWAN Spec v1.0.3 line 401 section 4.2.2:
Note: The Major version specifies the format of the messages exchanged in the join procedure (see Chapter 6.2) and the first four bytes of the MAC Payload as described in Chapter 4. For each major version, end-devices may implement different minor versions of the frame format. The minor version used by an end-device must be made known to the network server beforehand using out of band messages (e.g., as part of the device personalization information).
EUI – The IEEE Standards Association at [link]
Acquire MAC Addresses and other Unique Identifiers @ IEEE-SA – Registration Authority at [link]
Hosting the Network Server, Application Server, and Join Server across different servers is covered in the LoRaWAN backend Interfaces specification v1.0, LoRa Alliance at [link] from [link]
“DevEui vs AppEui” posted at the LoRa community forum at [link]
LoRaWAN Keys and IDs Overview RM1xx Series at [link]
LoRaWAN Address Space of The Things Network at [link]
LoRaWAN image clipped from [link]
LoRaWAN Spec Glossary #
ADR Adaptive Data Rate
AES Advanced Encryption Standard
AFA Adaptive Frequency Agility
AR Acknowledgement Request
CBC Cipher Block Chaining
CMAC Cipher-based Message Authentication Code
CR Coding Rate
CRC Cyclic Redundancy Check
DR Data Rate
ECB Electronic Code Book
ETSI European Telecommunications Standards Institute
EIRP Equivalent Isotropically Radiated Power
FSK Frequency Shift Keying modulation technique
GPRS General Packet Radio Service
HAL Hardware Abstraction Layer
IP Internet Protocol
LBT Listen Before Talk
LoRa? Long Range modulation technique
LoRaWAN? Long Range Network protocol
MAC Medium Access Control
MIC Message Integrity Code
RF Radio Frequency
RFU Reserved for Future Usage
RSSI Received Signal Strength Indicator
SF Spreading Factor
SNR Signal Noise Ratio
SPI Serial Peripheral Interface
SSL Secure Socket Layer
USB Universal Serial Bus