Security Vulnerabilities in LoRaWAN

被引:74
|
作者
Yang, Xueying [1 ]
Karampatzakis, Evgenios [2 ]
Doerr, Christian [1 ]
Kuipers, Fernando [1 ]
机构
[1] Delft Univ Technol, NL-2628 CD Delft, Netherlands
[2] Brightsight, NL-2628 XJ Delft, Netherlands
关键词
LoRaWAN; security; replay attack; eavesdropping; bit flipping; ACK spoofing;
D O I
10.1109/IoTDI.2018.00022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security features present in LoRaWAN, namely activation methods, key management, cryptography, counter management, and message acknowledgement. Subsequently, we discover and analyze several vulnerabilities of LoRaWAN. In particular, we design and describe 5 attacks: (1) a replay attack that leads to a selective denial-of-service on individual IoT devices, (2) plaintext recovery, (3) malicious message modification, (4) falsification of delivery reports, and (5) a battery exhaustion attack. As a proof-of-concept, the attacks are implemented and executed in a controlled LoRaWAN environment. Finally, we discuss how these attacks can be mitigated or protected against.
引用
收藏
页码:129 / 140
页数:12
相关论文
共 50 条
  • [1] LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation
    Hessel, Frank
    Almon, Lars
    Hollick, Matthias
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [2] IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
    Ingham, Max
    Marchang, Jims
    Bhowmik, Deepayan
    IET INFORMATION SECURITY, 2020, 14 (04) : 368 - 379
  • [3] LoRaWAN security
    Seller O.
    Journal of ICT Standardization, 2021, 9 (01): : 47 - 60
  • [4] Improving Hardware Security for LoRaWAN
    Navarro-Ortiz, Jorge
    Chinchilla-Romero, Natalia
    Ramos-Munoz, Juan J.
    Munoz-Luengo, Pablo
    2019 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2019,
  • [5] Formal security analysis of LoRaWAN
    Eldefrawy, Mohamed
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    COMPUTER NETWORKS, 2019, 148 : 328 - 339
  • [6] Demystifying LoRaWAN Security and Capacity
    Santamaria, Michael
    Marchiori, Alan
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [7] SECURITY SYSTEM VULNERABILITIES
    Constantinescu, Nicolae
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 175 - 179
  • [8] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [9] Moodle Security Vulnerabilities
    Galan Hernandez, Juan Carlos
    Leon Chavez, Miguel Angel
    2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2008), 2008, : 199 - 204
  • [10] LoRaWAN Energy Optimization with Security Consideration
    Khalifeh, Ala
    Aldandouh, Khaled
    Alouneh, Sahel
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (3A) : 476 - 483