Privacy-Preserving Pseudonyms for LoRaWAN

被引:0
作者
Pelissier, Samuel [1 ]
Aalmoes, Jan [1 ]
Mishra, Abhishek Kumar [1 ]
Cunche, Mathieu [1 ]
Roca, Vincent [2 ]
Donsez, Didier [3 ]
机构
[1] INSA Lyon, Inria, CITI Lab, Lyon, France
[2] Univ Grenoble Alpes, Inria, Grenoble, France
[3] Univ Grenoble Alpes, LIG, Grenoble, France
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2024 | 2024年
基金
欧盟地平线“2020”;
关键词
Privacy; Pseudonyms; LoRaWAN; IoT; Link-layer;
D O I
10.1145/3643833.3656120
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata exposure, particularly concerning the exploitation of stable device identifiers. For the first time in literature, we propose two privacy-preserving pseudonym schemes tailored for LoRaWAN: resolvable pseudonyms and sequential pseudonyms. We extensively evaluate their performance and applicability through theoretical analysis and simulations based on a large-scale real-world dataset of 71 million messages. We conclude that sequential pseudonyms are the best solution.
引用
收藏
页码:14 / 19
页数:6
相关论文
共 21 条
[1]  
Acar A., 2020, WISEC
[2]  
Baumker E, 2019, Journal of Physics: Conference Series, V1407, P1
[3]   Modeling the Energy Performance of LoRaWAN [J].
Casals, Lluis ;
Mir, Bernat ;
Vidal, Rafael ;
Gomez, Carles .
SENSORS, 2017, 17 (10)
[4]   Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism [J].
Celosia, Guillaume ;
Cunche, Mathieu .
PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, :444-453
[5]  
Core Specification Working Group, 2023, Bluetooth<(R)> Core Specification 5.4.
[6]  
Ginsparg P., 2005, Howmany coin flips on average does it take to get n consecutive heads?
[7]  
Greenstein B, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P40
[8]   LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation [J].
Hessel, Frank ;
Almon, Lars ;
Hollick, Matthias .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
[9]   I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks [J].
Leu, Patrick ;
Puddu, Ivan ;
Ranganathan, Aanjhan ;
Capkun, Srdjan .
WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, :23-33
[10]  
Liu Q, 2020, 2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), P704