Abstract-Internet-of-Things (IoT) deployments increasingly incorporate long range communication technologies. To support this transition, wide area IoT deployments are employing LoRa as their communication technology of choice due to its low power consumption and long range. The security of LoRa networks and devices is currently being put to the test in the wild, and has already become a major challenge. New features and characteristics of LoRa technology also intorduce new vulnerabilities against security attacks. In this paper, we investigate potential security vulnerabilities in LoRa. In particular, we analyze the LoRa network stack and discuss the possible susceptibility of LoRa devices to different types of attacks using commercial-off-the-shelf hardware. Our analysis shows that the long range transmissions of LoRa are vulnerable to multiple security attacks.
Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and urgent. This paper highlights security issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow modulation type in the protocol. We exploit these issues to develop a suite of practical attacks based around selective jamming. These attacks are conducted and evaluated using commodity hardware. The paper concludes by suggesting a range of countermeasures that can be used to mitigate the attacks.Comment: Mobiquitous 2017, November 7-10, 2017, Melbourne, VIC, Australi
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.