Security Vulnerabilities in LoRaWAN

被引:74
|
作者
Yang, Xueying [1 ]
Karampatzakis, Evgenios [2 ]
Doerr, Christian [1 ]
Kuipers, Fernando [1 ]
机构
[1] Delft Univ Technol, NL-2628 CD Delft, Netherlands
[2] Brightsight, NL-2628 XJ Delft, Netherlands
来源
2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020) | 2018年
关键词
LoRaWAN; security; replay attack; eavesdropping; bit flipping; ACK spoofing;
D O I
10.1109/IoTDI.2018.00022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security features present in LoRaWAN, namely activation methods, key management, cryptography, counter management, and message acknowledgement. Subsequently, we discover and analyze several vulnerabilities of LoRaWAN. In particular, we design and describe 5 attacks: (1) a replay attack that leads to a selective denial-of-service on individual IoT devices, (2) plaintext recovery, (3) malicious message modification, (4) falsification of delivery reports, and (5) a battery exhaustion attack. As a proof-of-concept, the attacks are implemented and executed in a controlled LoRaWAN environment. Finally, we discuss how these attacks can be mitigated or protected against.
引用
收藏
页码:129 / 140
页数:12
相关论文
共 50 条
  • [41] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [42] Security Vulnerabilities on Implantable Medical Devices
    Longras, Ana
    Oliveira, Henrique
    Paiva, Sara
    2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [43] E-learning Security Vulnerabilities
    Costinela-Luminita, Ciobanu
    Nicoleta-Magdalena, Ciobanu
    4TH WORLD CONFERENCE ON EDUCATIONAL SCIENCES (WCES-2012), 2012, 46 : 2297 - 2301
  • [44] Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
    Loukil, Slim
    Fourati, Lamia Chaari
    Nayyar, Anand
    Chee, K. -W. -A.
    SENSORS, 2022, 22 (10)
  • [45] Detecting Security Vulnerabilities with Vulnerability Nets
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Jiang, Wen
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 375 - 383
  • [46] Vulnerabilities and Security Issues in Optical Networks
    Furdek, Marija
    Skorin-Kapov, Nina
    Zsigmond, Szilard
    Wosinska, Lena
    2014 16TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2014,
  • [47] Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT
    Coman, Florian Laurentiu
    Malarski, Krzysztof Mateusz
    Petersen, Martin Nordal
    Ruepp, Sarah
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [48] Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study
    Pospisil, Ondrej
    Fujdiak, Radek
    Mikhaylov, Konstantin
    Ruotsalainen, Henri
    Misurec, Jiri
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [49] OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
    Singh, Jaimandeep
    Chaudhary, Naveen Kumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [50] A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
    Ntshabele, Koketso
    Isong, Bassey
    Gasela, Naison
    Abu-Mahfouz, Adnan M.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)