Security Vulnerabilities in LoRaWAN

被引:74
|
作者
Yang, Xueying [1 ]
Karampatzakis, Evgenios [2 ]
Doerr, Christian [1 ]
Kuipers, Fernando [1 ]
机构
[1] Delft Univ Technol, NL-2628 CD Delft, Netherlands
[2] Brightsight, NL-2628 XJ Delft, Netherlands
来源
2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020) | 2018年
关键词
LoRaWAN; security; replay attack; eavesdropping; bit flipping; ACK spoofing;
D O I
10.1109/IoTDI.2018.00022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security features present in LoRaWAN, namely activation methods, key management, cryptography, counter management, and message acknowledgement. Subsequently, we discover and analyze several vulnerabilities of LoRaWAN. In particular, we design and describe 5 attacks: (1) a replay attack that leads to a selective denial-of-service on individual IoT devices, (2) plaintext recovery, (3) malicious message modification, (4) falsification of delivery reports, and (5) a battery exhaustion attack. As a proof-of-concept, the attacks are implemented and executed in a controlled LoRaWAN environment. Finally, we discuss how these attacks can be mitigated or protected against.
引用
收藏
页码:129 / 140
页数:12
相关论文
共 50 条
  • [21] Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach
    Sanchez-Iborra, Ramon
    Sanchez-Gomez, Jesus
    Perez, Salvador
    Fernandez, Pedro J.
    Santa, Jose
    Hernandez-Ramos, Jose L.
    Skarmeta, Antonio F.
    SENSORS, 2018, 18 (06)
  • [22] Security vulnerabilities in DNS and DNSSEC
    Ariyapperuma, Suranjith
    Mitchell, Chris J.
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 335 - +
  • [23] Investigation on Security Risk of LoRaWAN: Compatibility Scenarios
    Loukil, Slim
    Fourati, Lamia Chaari
    Nayyar, Anand
    So-In, Chakchai
    IEEE ACCESS, 2022, 10 : 101825 - 101843
  • [24] An analysis of Bluetooth security vulnerabilities
    Hager, CT
    Midkiff, SF
    WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
  • [25] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [26] An Investigation of Bluetooth Security Vulnerabilities
    Cope, Peter
    Campbell, Joseph
    Hayajneh, Thaier
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [27] Security Vulnerabilities of Autonomous Platoons
    Ucar, Seyhan
    Ergen, Sinem Coleri
    Ozkasap, Oznur
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [28] Security Vulnerabilities and Countermeasures in MPSoCs
    Sant'Ana, Anderson Camargo
    Medina, Henrique
    Moraes, Fernando Gehm
    IEEE DESIGN & TEST, 2021, 38 (04) : 70 - 77
  • [29] Demonstrating vulnerabilities in Bluetooth security
    Hager, CT
    Midkiff, SF
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1420 - 1424
  • [30] Analysis of LoRaWAN v1.1 Security
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    PROCEEDINGS OF THE 4TH ACM MOBIHOC WORKSHOP ON EXPERIENCES WITH THE DESIGN AND IMPLEMENTATION OF SMART OBJECTS: SMARTOBJECTS'18, 2018,