Exploiting Physical Layer Vulnerabilities in LoRaWAN-based IoT Networks

被引:0
|
作者
Torres, Nuno [1 ]
Pinto, Pedro [1 ,2 ,3 ]
Lopes, Sergio Ivan [1 ,4 ,5 ]
机构
[1] Inst Politecn Viana do Castelo, ADiT LAB, P-4900348 Viana Do Castelo, Portugal
[2] Univ Maia, P-4475690 Maia, Portugal
[3] INESC TEC, P-4200465 Porto, Portugal
[4] IT Inst Telecomunicacoes, Campus Univ Santiago, P-3810193 Aveiro, Portugal
[5] CiTin Ctr Interface Tecnol Ind, P-4970786 Arcos De Valdevez, Portugal
来源
2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT | 2022年
关键词
Security; Vulnerabilities; IoT; LoRa; LoRaWAN; LPWAN;
D O I
10.1109/WF-IOT54382.2022.10152098
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Low Power Wide Area Networks (LPWAN) are used worldwide in several Internet of Things (IoT) applications that rely on large-scale deployments. Despite most of these networks include their own security mechanisms with built-in encryption, they are still vulnerable to a range of attacks that can be performed using low-cost Software Defined Radio (SDR) hardware and low-complexity techniques. This work provides an experimental setup implemented to exploit physical layer vulnerabilities with SDR techniques. Several attack vectors typically related to LPWAN within the IoT ecosystem are implemented and tested such as Global Positioning (GPS) Spoofing, Replay Attacks, Denial-of-Service (DoS) and Jamming, in environments that rely specifically on LoRaWAN networks. The results show that, in LoRAWAN networks, a set of vulnerabilities can be exploited leading to the incorrect functioning of the executed applications, and possible damage to the systems in which they operate. It was possible to verify that, depending on the type of activation method used between the devices and the LoRaWAN server, the communications and the devices can be compromised.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] LoRaWAN-based Smart Parking Service: Deployment and Performance Evaluation
    Santana, Juan Ramón
    Sotres, Pablo
    Pérez, Jesús
    Sánchez, Luis
    Lanza, Jorge
    Muñoz, Luis
    PE-WASUN 2022 - Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, 2022, : 107 - 114
  • [32] LoRaWAN-based control of operations of district heating transmission stations
    Gioßjohann, Gerhard
    Euroheat and Power/Fernwarme International, 2023, 52 (7-8): : 36 - 37
  • [33] Proposal of Adaptive Data Rate Algorithm for LoRaWAN-based Infrastructure
    Hauser, Vojtech
    Hegr, Tomas
    2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, : 85 - 90
  • [34] LoRaWAN-based monitoring: Control manual valves with little effort
    Vanderpool, Andrew
    ATP MAGAZINE, 2024, (05):
  • [35] IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
    Ingham, Max
    Marchang, Jims
    Bhowmik, Deepayan
    IET INFORMATION SECURITY, 2020, 14 (04) : 368 - 379
  • [36] A LoRaWAN-Based Smart Sensor Tag for Cow Behavior Monitoring
    Thai-Ha Dang
    Ngoc-Hai Dang
    Viet-Thang Tran
    Chung, Wan-Young
    2022 IEEE SENSORS, 2022,
  • [37] Secure Key Distribution for IoT Networks Based on Physical Layer Security
    Alshamaseen, Tasneem
    Althunibat, Saud
    Qaraqe, Marwa
    2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2021,
  • [38] QoS Based Spreading Factor Assignment for LoRaWAN Networks in IoT Applications
    Aggarwal, Shobhit
    Nasipuri, Asis
    SOUTHEASTCON 2022, 2022, : 46 - 53
  • [39] A LoRaWAN-Based Environmental Sensor System for Urban Tree Health Monitoring
    Zhao, Haokai
    Kam, Kevin A.
    Kymissis, Ioannis
    Culligan, Patricia J.
    2021 IEEE SENSORS, 2021,
  • [40] Polarization Fingerprint-Based LoRaWAN Physical Layer Authentication
    Xu, Jinlong
    Wei, Dong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4593 - 4608