2020
DOI: 10.1007/s10586-020-03064-8
|View full text |Cite
|
Sign up to set email alerts
|

Securing the LoRaWAN join procedure using blockchains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…As the attack is not possible in LoRaWAN v1.1, using this version would solve the problem. If the system requires the usage of LoRaWAN v1.0, we recommend the following security measures that can be applied to reduce the impact: Avoiding clear patterns to server reboots and resetting devices at random times will make it impossible for the attacker to disconnect multiple devices at once, severely lowering the impact of the attack. Resort to block‐chains for EDs' authentication in real‐time could eliminate the attack possibility and build trust among LoRaWAN EDs and NSs 74 Modifying the join procedure to account for potential replays while keeping the existing packet structure; an exemplary method using two types of join‐requests is presented by Kim and Song 42 …”
Section: Vulnerabilities and Mitigationsmentioning
confidence: 99%
See 1 more Smart Citation
“…As the attack is not possible in LoRaWAN v1.1, using this version would solve the problem. If the system requires the usage of LoRaWAN v1.0, we recommend the following security measures that can be applied to reduce the impact: Avoiding clear patterns to server reboots and resetting devices at random times will make it impossible for the attacker to disconnect multiple devices at once, severely lowering the impact of the attack. Resort to block‐chains for EDs' authentication in real‐time could eliminate the attack possibility and build trust among LoRaWAN EDs and NSs 74 Modifying the join procedure to account for potential replays while keeping the existing packet structure; an exemplary method using two types of join‐requests is presented by Kim and Song 42 …”
Section: Vulnerabilities and Mitigationsmentioning
confidence: 99%
“…Resort to block‐chains for EDs' authentication in real‐time could eliminate the attack possibility and build trust among LoRaWAN EDs and NSs 74 …”
Section: Vulnerabilities and Mitigationsmentioning
confidence: 99%
“…To protect the join procedure against jamming and replay attacks, a blockchain-based LoRaWAN architecture is also proposed by the authors in [11]. In the proposed architecture, the blockchain nodes are the the Network Servers in the LoRAWAN.…”
Section: Related Workmentioning
confidence: 99%
“…Although voting with blockchain is not perfect, it can make a big difference. Danish et al [25]believed one of the security issues is the replay attacks that occur when connecting to the LoRaWAN network. Blockchain can provide a way to join LoRaWAN networks to develop a reliable and trustworthy authentication system for LoRaWAN networks.…”
Section: Research Background and Related Workmentioning
confidence: 99%