LoRaWan Sensitivity Analysis and Prevention Strategies Against Wireless DoS Attacks

被引:0
作者
N. Prasad
P. Lynggaard
机构
[1] Aarhus University,CTIF Global Capsule (CGC), School of Business and Social Sciences
[2] Technical University of Denmark,undefined
来源
Wireless Personal Communications | 2022年 / 126卷
关键词
LoRaWAN; DoS attack; Jamming; Critical infrastructures; IoT sensors;
D O I
暂无
中图分类号
学科分类号
摘要
New wireless IoT technology provides smart pseudo intelligent solutions that will have a big impact on the infrastructures and the society in the future to come. In the last decade, many new low power longrange wireless technologies have emerged to support these wireless IoT based solutions. One of the most promising and commonly accepted technologies is LoRaWAN. Unfortunately, the introduction and deployment of a new wireless technology provides new risks and new security challenges. Some of these challenges can be categorized as “critical”, which means that if they fail, this will have major consequences for the society’s critical infrastructure and the society as a hole. In this paper one of these critical challenges is analyzed in terms of wireless jamming attacks that cause fatale denial-of-services on the LoRaWAN wireless infrastructure and connectivity. This analysis is based on a mathematical simulation model which is described and elaborated. By using this model on a selected societal critical service example, a sensitivity analysis in terms of jamming and DoS attacks is performed, provided, and elaborated. Finally, some selected prevention strategies to avoid and counter-fight these attacks are presented, discussed, and elaborated.
引用
收藏
页码:3663 / 3675
页数:12
相关论文
共 13 条
[1]  
Tomic I(2017)A survey of potential security issues in existing wireless sensor network protocols IEEE Internet of Things Journal 4 1910-1923
[2]  
McCann JA(2011)Physical layer security in wireless networks: A tutorial IEEE wireless Communications 18 66-74
[3]  
Shiu Y-S(2020)On the error rate of the LoRa modulation with interference IEEE Transactions on Wireless Communications 19 1292-1304
[4]  
Chang SY(2018)Closed-form approximation of LoRa modulation BER performance IEEE Communications Letters 22 1778-1781
[5]  
Wu H-C(undefined)undefined undefined undefined undefined-undefined
[6]  
Huang SC-H(undefined)undefined undefined undefined undefined-undefined
[7]  
Chen H-H(undefined)undefined undefined undefined undefined-undefined
[8]  
Afisiadis O(undefined)undefined undefined undefined undefined-undefined
[9]  
Cotting M(undefined)undefined undefined undefined undefined-undefined
[10]  
Burg A(undefined)undefined undefined undefined undefined-undefined