A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol

被引:8
作者
Gao, Shu-Yang [1 ,2 ]
Li, Xiao-Hong [1 ,2 ]
Ma, Mao-De [3 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[2] Tianjin Key Lab Adv Networking, Tianjin 300350, Peoples R China
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
美国国家科学基金会;
关键词
awareness; defense; LoRaWAN; replay attack;
D O I
10.3390/s19235122
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specification and the limited consumption performance of devices to carry out security attacks such as replay attacks. In the process of the over-the-air-activation (OTAA) for LoRa nodes, attackers can modify the data because the data is transmitted in plain text. If the user's root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network. To solve this security flaw in LoRaWAN, we propose a countermeasure called Secure-Packet-Transmission scheme (SPT) which works based on the LoRaWAN standard v1.1 to prevent replay attacks when an attacker has obtained the root key. The proposed scheme redefines the format of join-request packet, add the new One Time Password (OTP) encrypted method and changes the transmission strategy in OTAA between LoRa nodes and network server. The security evaluation by using the Burrows-Abadi-Needham logic (BAN Logic) and the Scyther shows that the security goal can be achieved. This paper also conducts extensive experiments by simulations and a testbed to perform feasibility and performance analysis. All results demonstrate that SPT is lightweight, efficient and able to defend against malicious behavior.
引用
收藏
页数:19
相关论文
共 24 条
[1]  
[Anonymous], 2016, LORA SECURITY BUILDI
[2]  
Aras E., 2017, P IEEE INT C CYB EX
[3]  
Basford P.J., 2019, P 2019 GLOB IOT SUMM, P1, DOI [10.1109/GIOTS.2019.8766359, DOI 10.1109/GIOTS.2019.8766359]
[4]  
Benkahla Norhane, 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), P1, DOI 10.1109/IWCMC.2019.8766738
[5]   Energy Consumption Model for Sensor Nodes Based on LoRa and LoRaWAN [J].
Bouguera, Taoufik ;
Diouris, Jean-Francois ;
Chaillout, Jean-Jacques ;
Jaouadi, Randa ;
Andrieux, Guillaume .
SENSORS, 2018, 18 (07)
[6]   Security of Join Procedure and its Delegation in LoRaWAN v1.1 [J].
Donmez, Tahsin C. M. ;
Nigussie, Ethiopia .
15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 :204-211
[7]   Formal security analysis of LoRaWAN [J].
Eldefrawy, Mohamed ;
Butun, Ismail ;
Pereira, Nuno ;
Gidlund, Mikael .
COMPUTER NETWORKS, 2019, 148 :328-339
[8]  
Geneiatakis D, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1292, DOI 10.23919/MIPRO.2017.7973622
[9]  
Jacobsson A, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P727, DOI 10.1109/WF-IoT.2015.7389144
[10]   A risk analysis of a smart home automation system [J].
Jacobsson, Andreas ;
Boldt, Martin ;
Carlsson, Bengt .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :719-733