Security Vulnerabilities in LoRaWAN

被引:74
|
作者
Yang, Xueying [1 ]
Karampatzakis, Evgenios [2 ]
Doerr, Christian [1 ]
Kuipers, Fernando [1 ]
机构
[1] Delft Univ Technol, NL-2628 CD Delft, Netherlands
[2] Brightsight, NL-2628 XJ Delft, Netherlands
来源
2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020) | 2018年
关键词
LoRaWAN; security; replay attack; eavesdropping; bit flipping; ACK spoofing;
D O I
10.1109/IoTDI.2018.00022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security features present in LoRaWAN, namely activation methods, key management, cryptography, counter management, and message acknowledgement. Subsequently, we discover and analyze several vulnerabilities of LoRaWAN. In particular, we design and describe 5 attacks: (1) a replay attack that leads to a selective denial-of-service on individual IoT devices, (2) plaintext recovery, (3) malicious message modification, (4) falsification of delivery reports, and (5) a battery exhaustion attack. As a proof-of-concept, the attacks are implemented and executed in a controlled LoRaWAN environment. Finally, we discuss how these attacks can be mitigated or protected against.
引用
收藏
页码:129 / 140
页数:12
相关论文
共 50 条
  • [1] LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation
    Hessel, Frank
    Almon, Lars
    Hollick, Matthias
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [2] LoRaWAN security
    Seller O.
    Journal of ICT Standardization, 2021, 9 (01): : 47 - 60
  • [3] IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
    Ingham, Max
    Marchang, Jims
    Bhowmik, Deepayan
    IET INFORMATION SECURITY, 2020, 14 (04) : 368 - 379
  • [4] Demystifying LoRaWAN Security and Capacity
    Santamaria, Michael
    Marchiori, Alan
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [5] Improving Hardware Security for LoRaWAN
    Navarro-Ortiz, Jorge
    Chinchilla-Romero, Natalia
    Ramos-Munoz, Juan J.
    Munoz-Luengo, Pablo
    2019 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2019,
  • [6] LoRaWAN Energy Optimization with Security Consideration
    Khalifeh, Ala
    Aldandouh, Khaled
    Alouneh, Sahel
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (3A) : 476 - 483
  • [7] Exploiting Physical Layer Vulnerabilities in LoRaWAN-based IoT Networks
    Torres, Nuno
    Pinto, Pedro
    Lopes, Sergio Ivan
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [8] Formal security analysis of LoRaWAN
    Eldefrawy, Mohamed
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    COMPUTER NETWORKS, 2019, 148 : 328 - 339
  • [9] LoRaWAN End Nodes: Security and Energy Efficiency Analysis
    Mehic, Miralem
    Duliman, Mugdim
    Selimovic, Nejra
    Voznak, Miroslav
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (11) : 8997 - 9009
  • [10] General Security Considerations of LoRaWAN Version 1.1 Infrastructures
    Mundt, Thomas
    Gladisch, Alexander
    Rietschel, Simon
    Bauer, Johann
    Goltz, Johannes
    Wiedenmann, Simeon
    PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS (MOBIWAC'18), 2018, : 118 - 123