A Survey on Attacks and Defences on LoRaWAN Gateways

Author(s):  
Olof Magnusson ◽  
Rikard Teodorsson ◽  
Joakim Wennerberg ◽  
Stig Arne Knoph

LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.

Energies ◽  
2021 ◽  
Vol 14 (18) ◽  
pp. 5614
Author(s):  
Khola Anwar ◽  
Taj Rahman ◽  
Asim Zeb ◽  
Yousaf Saeed ◽  
Muhammad Adnan Khan ◽  
...  

A Long-Range Wide Area Network (LoRaWAN) is one of the most efficient technologies and is widely adopted for the Internet of Things (IoT) applications. The IoT consists of massive End Devices (EDs) deployed over large geographical areas, forming a large environment. LoRaWAN uses an Adaptive Data Rate (ADR), targeting static EDs. However, the ADR is affected when the channel conditions between ED and Gateway (GW) are unstable due to shadowing, fading, and mobility. Such a condition causes massive packet loss, which increases the convergence time of the ADR. Therefore, we address the convergence time issue and propose a novel ADR at the network side to lower packet losses. The proposed ADR is evaluated through extensive simulation. The results show an enhanced convergence time compared to the state-of-the-art ADR method by reducing the packet losses and retransmission under dynamic mobile LoRaWAN network.


Author(s):  
Domenico Garlisi ◽  
Alessio Martino ◽  
Jad Zouwayhed ◽  
Reza Pourrahim ◽  
Francesca Cuomo

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as IoT information related to the network level (wireless or wired) is gathered by the network operators. In this paper, we provide a systematic approach to process network data gathered from a wide area IoT wireless platform based on LoRaWAN (Long Range Wide Area Network). Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies. Specifically, we use the k-means algorithm to group LoRaWAN packets according to their radio and network behavior. We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database. Quite important is the fact that LoRaWAN captures, via the wireless interface, packets of multiple operators. Indeed our analysis was performed on 997, 183 packets with 2169 devices involved and only a subset of them were known by the considered operator, meaning that an operator cannot control the whole behavior of the system but on the contrary has to observe it. We were able to analyze clusters’ contents, revealing results both in line with the current network behavior and alerts on malfunctioning devices, remarking the reliability of the proposed approach.


2019 ◽  
Vol 11 (3) ◽  
pp. 57 ◽  
Author(s):  
Lorenzo Vangelista ◽  
Marco Centenaro

The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, and has the aim of describing a particularly interesting feature provided by the latest LoRaWAN™ specification—often neglected in the literature—i.e., the roaming capability between different operators of LoRaWAN™ networks, across the same country or even different countries. Recalling that LoRaWAN™ devices do not have a subscriber identification module (SIM) like cellular network terminals, at a first glance the implementation of roaming in LoRaWAN™ networks could seem intricate. The contribution of this paper consists in explaining the principles behind the implementation of a global LoRaWAN network, with particular focus on how to cope with the lack of the SIM in the architecture and how to realize roaming.


2020 ◽  
Vol 6 (Supplement_1) ◽  
pp. 58-58
Author(s):  
Lamech Sigu ◽  
Fredrick Chite ◽  
Emma Achieng ◽  
Andrew Koech

PURPOSE The Internet of Things (IoT) is a technology that involves all things connected to the Internet that share data over a network without requiring human-to-human interaction or human-to-computer interaction. Information collected from IoT devices can help physicians identify the best treatment process for patients and reach accurate and expected outcomes. METHODS The International Cancer Institute is partnering to set up remote oncology clinics in sub-Saharan Africa. Medical oncologists and expert teams from across the world connect with oncology clinics in other Kenyan counties—Kisumu, Meru, Makueni, Garissa, Kakamega, Bungoma, Siaya, and Vihiga counties. The furthest county is Garissa, approximately 651.1 km from Eldoret, and the nearest is Vihiga at 100.4 km from Eldoret. This study began July 2019, and as of November 30th, the team has hosted 21 sessions with an average of 11 participants attending a session led by a medical oncologist. RESULTS IoT devices have become a way by which a patient gets all the information he or she needs from a physician without going to the clinic. Patient monitoring can be done in real time, allowing access to real-time information with improved patient treatment outcomes and a decrease in cost. Through IoT-enabled devices, the International Cancer Institute has set up weekly virtual tumor boards during which cancer cases are presented and discussed by all participating counties. An online training module on cancer is also offered. Furthermore, remote monitoring of a patient’s health helps to reduce the length of hospital stay and prevents readmissions. CONCLUSION In our setting, which has a few oncologists, use of IoT and tumor boards has helped to improve patient decision support as well as training for general physicians.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 194
Author(s):  
R Caroline Kalaiselvi ◽  
S Mary Vennila

The Internet of Things (IoT) prompts can administered by gathering data from little sensor gadgets. As of late, stockpiling less detecting gadgets have been utilized to actualize IoT administrations.  They rely upon conveyed programming from a system server to work benefit capacities and IoT administrations are in view of gathered client data. In this way, it is critical to keep up trusted associations aid programming conveyance or information transmission. In the event that a system association is deceitful, stable information transmission can't be accomplished. Dishonest information associations cause numerous issues in IoT administrations. In this manner, this paper proposes a product refresh strategy in trusted association of IoT organizing. The technique utilizes Low Power Wide Area Network (LPWAN) as long-go IoT organizing innovation and utilizations a portable edge cloud to enhance registering effectiveness in an entrance arrange that comprises of IoT gadgets with lacking assets. In the strategy, the versatile edge cloud is coordinated into a door, and forms detecting information and remote programming updates of LPWAN. IoT gadgets can get programming capacities from the versatile edge cloud. The proposed strategy investigates measurable data about associations in a get to arrange and decides the LPWAN put stock in associations. At that point, programming updates can be performed over the confided in association. Utilizing trusted associations prompts an expanded bundle conveyance rate and decreased transmission vitality utilization. The strategy is contrasted with at present accessible frameworks through PC recreation and through computer simulation and this method’s efficiency is validated. 


2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Jaehyu Kim ◽  
JooSeok Song

With the advent of the Internet of Things (IoT) era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN) technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa) is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN) is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption.


TecnoLógicas ◽  
2019 ◽  
Vol 22 (46) ◽  
pp. 185-194
Author(s):  
Andrés F. Bravo-Montoya ◽  
Jefersson S. Rondón-Sanabria ◽  
Elvis E. Gaona-García

This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.


BWK ENERGIE. ◽  
2019 ◽  
Vol 71 (05) ◽  
pp. 24-25
Author(s):  
Steffen Heudtlaß

INTERNET OF THINGS | Ob Smart Home, Smart Building oder Smart City – Stadtwerke sollten die neuen Betätigungsfelder mithilfe der Long-Range-Wide-Area-Network (LoRaWAN)-Funktechnologie rasch besetzen, rät Steffen Heudtlaß, bei der MeterPan GmbH verantwortlicher Geschäftsentwickler. Das Unternehmen aus Norderstedt unterstützt Versorger beim Schritt in die Welt des Internet of Things (IoT).


Sign in / Sign up

Export Citation Format

Share Document