Security Vulnerabilities in LoRaWAN

被引:74
|
作者
Yang, Xueying [1 ]
Karampatzakis, Evgenios [2 ]
Doerr, Christian [1 ]
Kuipers, Fernando [1 ]
机构
[1] Delft Univ Technol, NL-2628 CD Delft, Netherlands
[2] Brightsight, NL-2628 XJ Delft, Netherlands
关键词
LoRaWAN; security; replay attack; eavesdropping; bit flipping; ACK spoofing;
D O I
10.1109/IoTDI.2018.00022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security features present in LoRaWAN, namely activation methods, key management, cryptography, counter management, and message acknowledgement. Subsequently, we discover and analyze several vulnerabilities of LoRaWAN. In particular, we design and describe 5 attacks: (1) a replay attack that leads to a selective denial-of-service on individual IoT devices, (2) plaintext recovery, (3) malicious message modification, (4) falsification of delivery reports, and (5) a battery exhaustion attack. As a proof-of-concept, the attacks are implemented and executed in a controlled LoRaWAN environment. Finally, we discuss how these attacks can be mitigated or protected against.
引用
收藏
页码:129 / 140
页数:12
相关论文
共 50 条
  • [31] Analysis of LoRaWAN v1.1 Security
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    PROCEEDINGS OF THE 4TH ACM MOBIHOC WORKSHOP ON EXPERIENCES WITH THE DESIGN AND IMPLEMENTATION OF SMART OBJECTS: SMARTOBJECTS'18, 2018,
  • [32] Security Risk Analysis of LoRaWAN and Future Directions
    Butun, Ismail
    Pereira, Nuno
    Gidlund, Mikael
    FUTURE INTERNET, 2019, 11 (01):
  • [33] Automatic Speaker Verification, ZigBee and LoRaWAN: Potential Threats and Vulnerabilities in Smart Cities
    Rajput, Adil E.
    Brahimi, Tayeb
    Sarirete, Akila
    RESEARCH & INNOVATION FORUM 2019: TECHNOLOGY, INNOVATION, EDUCATION, AND THEIR SOCIAL IMPACT, 2019, : 277 - 285
  • [34] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [35] LoRaWAN End Nodes: Security and Energy Efficiency Analysis
    Mehic, Miralem
    Duliman, Mugdim
    Selimovic, Nejra
    Voznak, Miroslav
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (11) : 8997 - 9009
  • [36] LoRaWAN with HSM as a Security Improvement for Agriculture Applications - Evaluation
    Kloibhofer, Reinhard
    Kristen, Erwin
    Ameri, Afshin E.
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2021), 2021, 12853 : 128 - 140
  • [37] Security vulnerabilities and solutions for packet sampling
    Goldberg, Sharon
    Rexford, Jennifer
    2007 IEEE SARNOFF SYMPOSIUM, 2007, : 489 - 495
  • [38] Security Issues and Vulnerabilities in Web Application
    Anumotu, Sitara
    Jha, Kushagra
    Balhara, Amit
    Chawla, Pronika
    NEXT GENERATION OF INTERNET OF THINGS, 2023, 445 : 103 - 114
  • [39] Detecting security vulnerabilities with vulnerability nets
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Jiang, Wen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 208
  • [40] Automated Responsible Disclosure of Security Vulnerabilities
    Lisi, Andrea
    Mukherjee, Prateeti
    De Santis, Laura
    Wu, Lei
    Lagutin, Dmitrij
    Kortesniemi, Yki
    IEEE ACCESS, 2022, 10 : 10472 - 10489