Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2017
DOI: 10.1145/3144457.3144478
|View full text |Cite
|
Sign up to set email alerts
|

Selective Jamming of LoRaWAN using Commodity Hardware

Abstract: Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and ur… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
33
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 72 publications
(39 citation statements)
references
References 25 publications
1
33
0
Order By: Relevance
“…In what concerns non-LoRa interferers, due to the redundancy associated with wideband spread-spectrum modulation, LoRa is resilient to the interference mechanism that appears as bursty short duration pulses [1]. According to [13] , LoRa can tolerate a non LoRa interferer if this is less than 5dB (19.5dB) above desired signal for SF=7 (12) for the case of an error coding scheme of 4/6. Being wide-band, a narrow band jamming signal would only add noise on a very small portion of this band and the LoRa signal would still be recoverable.…”
Section: Security Mechanisms In Lorawanmentioning
confidence: 99%
See 3 more Smart Citations
“…In what concerns non-LoRa interferers, due to the redundancy associated with wideband spread-spectrum modulation, LoRa is resilient to the interference mechanism that appears as bursty short duration pulses [1]. According to [13] , LoRa can tolerate a non LoRa interferer if this is less than 5dB (19.5dB) above desired signal for SF=7 (12) for the case of an error coding scheme of 4/6. Being wide-band, a narrow band jamming signal would only add noise on a very small portion of this band and the LoRa signal would still be recoverable.…”
Section: Security Mechanisms In Lorawanmentioning
confidence: 99%
“…Phishing opens the door to a wide range of possibilities: traffic capture, network flood, controlling of network parameters and other further possible exploitations. In mesh networks, wormhole attacks are used to create false route information and routing loops that increase the energy consumption of these networks [12].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The recent works on LPWANs and LoRa have focussed on addressing challenges related to network performance, coverage and scalability [3,10,14,21]. Several vulnerabilities, such as replay attacks [4,33], reactive jamming [5], key extraction [33] and fingerprinting end devices [27] were successfully demonstrated. To the best of our knowledge, the implications of information leakage in LPWANs have so far not been studied.…”
Section: Related Workmentioning
confidence: 99%