Formal security analysis of LoRaWAN

被引:68
|
作者
Eldefrawy, Mohamed [1 ]
Butun, Ismail [1 ]
Pereira, Nuno [2 ]
Gidlund, Mikael [1 ]
机构
[1] Mid Sweden Univ, Informat Syst & Technol, Sundsvall, Sweden
[2] Polytech Porto IPP, Sch Engn DEI ISEP, Porto, Portugal
关键词
LoRaWAN; IoT; Scyther verification;
D O I
10.1016/j.comnet.2018.11.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:328 / 339
页数:12
相关论文
共 50 条
  • [41] Formal Analysis of Security Metrics with Defensive Actions
    Krautsevich, Leanid
    Martinelli, Fabio
    Yautsiukhin, Artsiom
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 458 - 465
  • [42] Formal modeling and security analysis method of security protocol based on CPN
    Gong X.
    Feng T.
    Du J.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [43] Observational equivalence and security games: Enhancing the formal analysis of security protocols
    Cai, Liujia
    Cai, Guangying
    Lu, Siqi
    Li, Guangsong
    Wang, Yongjuan
    COMPUTERS & SECURITY, 2024, 140
  • [44] Investigation on Security Risk of LoRaWAN: Compatibility Scenarios
    Loukil, Slim
    Fourati, Lamia Chaari
    Nayyar, Anand
    So-In, Chakchai
    IEEE ACCESS, 2022, 10 : 101825 - 101843
  • [45] Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements
    Hassan, R.
    Eltoweissy, M.
    Bohner, S.
    El-Kassas, S.
    IET SOFTWARE, 2010, 4 (02) : 149 - 160
  • [46] Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT
    Coman, Florian Laurentiu
    Malarski, Krzysztof Mateusz
    Petersen, Martin Nordal
    Ruepp, Sarah
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [47] A formal basis for the design and analysis of firewall security policies
    Khoumsi, Ahmed
    Erradi, Mohammed
    Krombi, Wadie
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2018, 30 (01) : 51 - 66
  • [48] Formal Security Analysis for Ad-Hoc Networks
    Nanz, Sebastian
    Hankin, Chris
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 142 : 195 - 213
  • [49] A formal system for analysis of cryptographic encryption and their security properties
    Hagihara, F
    Hagihara, S
    Yonezaki, N
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 87 - 112
  • [50] Suspicion-driven formal analysis of security requirements
    Amalio, Nuno
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 217 - 223