Formal security analysis of LoRaWAN

被引:68
|
作者
Eldefrawy, Mohamed [1 ]
Butun, Ismail [1 ]
Pereira, Nuno [2 ]
Gidlund, Mikael [1 ]
机构
[1] Mid Sweden Univ, Informat Syst & Technol, Sundsvall, Sweden
[2] Polytech Porto IPP, Sch Engn DEI ISEP, Porto, Portugal
关键词
LoRaWAN; IoT; Scyther verification;
D O I
10.1016/j.comnet.2018.11.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:328 / 339
页数:12
相关论文
共 50 条
  • [1] LoRaWAN security
    Seller O.
    Journal of ICT Standardization, 2021, 9 (01): : 47 - 60
  • [2] Analysis of LoRaWAN v1.1 Security
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    PROCEEDINGS OF THE 4TH ACM MOBIHOC WORKSHOP ON EXPERIENCES WITH THE DESIGN AND IMPLEMENTATION OF SMART OBJECTS: SMARTOBJECTS'18, 2018,
  • [3] Security Risk Analysis of LoRaWAN and Future Directions
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    FUTURE INTERNET, 2019, 11 (01):
  • [4] Security Vulnerabilities in LoRaWAN
    Yang, Xueying
    Karampatzakis, Evgenios
    Doerr, Christian
    Kuipers, Fernando
    2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020), 2018, : 129 - 140
  • [5] LoRaWAN End Nodes: Security and Energy Efficiency Analysis
    Mehic, Miralem
    Duliman, Mugdim
    Selimovic, Nejra
    Voznak, Miroslav
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (11) : 8997 - 9009
  • [6] Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
    Loukil, Slim
    Fourati, Lamia Chaari
    Nayyar, Anand
    Chee, K. -W. -A.
    SENSORS, 2022, 22 (10)
  • [7] Improving Hardware Security for LoRaWAN
    Navarro-Ortiz, Jorge
    Chinchilla-Romero, Natalia
    Ramos-Munoz, Juan J.
    Munoz-Luengo, Pablo
    2019 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2019,
  • [8] A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
    Ntshabele, Koketso
    Isong, Bassey
    Gasela, Naison
    Abu-Mahfouz, Adnan M.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
  • [9] Demystifying LoRaWAN Security and Capacity
    Santamaria, Michael
    Marchiori, Alan
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [10] Security Analysis of LoRaWAN™ Join Procedure for Internet of Things Networks
    Tomasin, Stefano
    Zulian, Simone
    Vangelista, Lorenzo
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2017,