Security Vulnerabilities in LoRaWAN

被引:74
|
作者
Yang, Xueying [1 ]
Karampatzakis, Evgenios [2 ]
Doerr, Christian [1 ]
Kuipers, Fernando [1 ]
机构
[1] Delft Univ Technol, NL-2628 CD Delft, Netherlands
[2] Brightsight, NL-2628 XJ Delft, Netherlands
来源
2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020) | 2018年
关键词
LoRaWAN; security; replay attack; eavesdropping; bit flipping; ACK spoofing;
D O I
10.1109/IoTDI.2018.00022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security features present in LoRaWAN, namely activation methods, key management, cryptography, counter management, and message acknowledgement. Subsequently, we discover and analyze several vulnerabilities of LoRaWAN. In particular, we design and describe 5 attacks: (1) a replay attack that leads to a selective denial-of-service on individual IoT devices, (2) plaintext recovery, (3) malicious message modification, (4) falsification of delivery reports, and (5) a battery exhaustion attack. As a proof-of-concept, the attacks are implemented and executed in a controlled LoRaWAN environment. Finally, we discuss how these attacks can be mitigated or protected against.
引用
收藏
页码:129 / 140
页数:12
相关论文
共 50 条
  • [31] Securing End-Node to Gateway Communication in LoRaWAN With a Lightweight Security Protocol
    Barriga, Jhonattan J.
    Guun Yoo, Sang
    IEEE ACCESS, 2022, 10 : 96672 - 96694
  • [32] Automatic Speaker Verification, ZigBee and LoRaWAN: Potential Threats and Vulnerabilities in Smart Cities
    Rajput, Adil E.
    Brahimi, Tayeb
    Sarirete, Akila
    RESEARCH & INNOVATION FORUM 2019: TECHNOLOGY, INNOVATION, EDUCATION, AND THEIR SOCIAL IMPACT, 2019, : 277 - 285
  • [33] LoRaWAN with HSM as a Security Improvement for Agriculture Applications - Evaluation
    Kloibhofer, Reinhard
    Kristen, Erwin
    Ameri, Afshin E.
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2021), 2021, 12853 : 128 - 140
  • [34] Security Issues and Vulnerabilities in Web Application
    Anumotu, Sitara
    Jha, Kushagra
    Balhara, Amit
    Chawla, Pronika
    NEXT GENERATION OF INTERNET OF THINGS, 2023, 445 : 103 - 114
  • [35] Vulnerabilities and storage security in Cloud Computing
    Derfouf, Mostapha
    Mimouni, Amina
    Eleuldj, Mohsine
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 295 - 299
  • [36] Detecting security vulnerabilities with vulnerability nets
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Jiang, Wen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 208
  • [37] Security Vulnerabilities in Ethereum Smart Contracts
    Mense, Alexander
    Flatscher, Markus
    IIWAS2018: THE 20TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2014, : 375 - 380
  • [38] Assessing the security vulnerabilities of correctional facilities
    Spencer, DS
    Morrison, GS
    ENFORCEMENT AND SECURITY TECHNOLOGIES, 1998, 3575 : 156 - 163
  • [39] Security Vulnerabilities in Mobile Health Applications
    Aliasgari, Mehrdad
    Black, Michael
    Yadav, Nikhil
    2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018), 2018, : 21 - 26
  • [40] Reducing security vulnerabilities for critical infrastructure
    Ryu, Dae Hyun
    Kim, HyungJun
    Um, Keehong
    JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2009, 22 (06) : 1020 - 1024