2017 3rd IEEE International Conference on Cybernetics (CYBCONF) 2017
DOI: 10.1109/cybconf.2017.7985777
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the Security Vulnerabilities of LoRa

Abstract: Abstract-Internet-of-Things (IoT) deployments increasingly incorporate long range communication technologies. To support this transition, wide area IoT deployments are employing LoRa as their communication technology of choice due to its low power consumption and long range. The security of LoRa networks and devices is currently being put to the test in the wild, and has already become a major challenge. New features and characteristics of LoRa technology also intorduce new vulnerabilities against security att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
96
0
5

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 188 publications
(101 citation statements)
references
References 8 publications
0
96
0
5
Order By: Relevance
“…By abusing the coexistence issues described above, it is possible to jam LoRa messages using well timed malicious transmissions. Previous work on this topic [3] showed the long air-time of LoRa messages made this triggered jamming (as opposed to continuous) possible and effective. The setup described there jams any LoRa message broadcast on the frequency the jammer is listening to.…”
Section: Lora Jammingmentioning
confidence: 99%
See 1 more Smart Citation
“…By abusing the coexistence issues described above, it is possible to jam LoRa messages using well timed malicious transmissions. Previous work on this topic [3] showed the long air-time of LoRa messages made this triggered jamming (as opposed to continuous) possible and effective. The setup described there jams any LoRa message broadcast on the frequency the jammer is listening to.…”
Section: Lora Jammingmentioning
confidence: 99%
“…We tested this triggered jamming technique in our previous work [3]. For each SF, we sent 100 messages on the 868.1 MHz frequency and only 3 messages out of 600 (0.5%) reached the gateway when the triggered jammer was on.…”
Section: Triggered Jammingmentioning
confidence: 99%
“…There are only a few studies address the LoRaWAN security [80,81]. Studies focus on the most important and the least secure stages of the LoRaWAN network protocol which is activation process [82].…”
Section: Securitymentioning
confidence: 99%
“…Especially, as discussed in [4], LoRaWAN has the best interference immunity characteristics among other LPWAN solutions (e.g., Sigfox). However, as mentioned in [27], novel jamming attacks, such as selective-jamming, can still be successful against LoRaWAN, and these will affect the availability of the network.…”
Section: Related Workmentioning
confidence: 99%