Formal security analysis of LoRaWAN

被引:69
|
作者
Eldefrawy, Mohamed [1 ]
Butun, Ismail [1 ]
Pereira, Nuno [2 ]
Gidlund, Mikael [1 ]
机构
[1] Mid Sweden Univ, Informat Syst & Technol, Sundsvall, Sweden
[2] Polytech Porto IPP, Sch Engn DEI ISEP, Porto, Portugal
关键词
LoRaWAN; IoT; Scyther verification;
D O I
10.1016/j.comnet.2018.11.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:328 / 339
页数:12
相关论文
共 50 条
  • [21] Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT
    Coman, Florian Laurentiu
    Malarski, Krzysztof Mateusz
    Petersen, Martin Nordal
    Ruepp, Sarah
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [22] Securing End-Node to Gateway Communication in LoRaWAN With a Lightweight Security Protocol
    Barriga, Jhonattan J.
    Guun Yoo, Sang
    IEEE ACCESS, 2022, 10 : 96672 - 96694
  • [23] LoRaWAN with HSM as a Security Improvement for Agriculture Applications - Evaluation
    Kloibhofer, Reinhard
    Kristen, Erwin
    Ameri, Afshin E.
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2021), 2021, 12853 : 128 - 140
  • [24] General Security Considerations of LoRaWAN Version 1.1 Infrastructures
    Mundt, Thomas
    Gladisch, Alexander
    Rietschel, Simon
    Bauer, Johann
    Goltz, Johannes
    Wiedenmann, Simeon
    PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS (MOBIWAC'18), 2018, : 118 - 123
  • [25] Internet Access for LoRaWAN Devices Considering Security Issues
    Sanchez-Iborra, Ramon
    Sanchez-Gomez, Jesus
    Perez, Salvador
    Fernandez, Pedro J.
    Santa, Jose
    Hernandez-Ramos, Jose L.
    Skarmeta, Antonio F.
    2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 203 - 208
  • [26] Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study
    Pospisil, Ondrej
    Fujdiak, Radek
    Mikhaylov, Konstantin
    Ruotsalainen, Henri
    Misurec, Jiri
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [27] Formal Modelling and Security Analysis of Inter-Operable Systems
    Baouya, Abdelhakim
    Ouchani, Samir
    Bensalem, Saddek
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND PRACTICES IN ARTIFICIAL INTELLIGENCE, 2022, 13343 : 555 - 567
  • [28] Geolocation analysis for Search And Rescue systems using LoRaWAN
    Bouras, Christos
    Gkamas, Apostolos
    Kokkinos, Vasileios
    Papachristos, Nikolaos
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (17)
  • [29] Slotted ALOHA on LoRaWAN-Design, Analysis, and Deployment
    Polonelli, Tommaso
    Brunelli, Davide
    Marzocchi, Achille
    Benini, Luca
    SENSORS, 2019, 19 (04)
  • [30] Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks
    Mohamed, Ali
    Wang, Franz
    Butun, Ismail
    Qadir, Junaid
    Lagerstrom, Robert
    Gastaldo, Paolo
    Caviglia, Daniele D.
    SENSORS, 2022, 22 (09)