Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2018
DOI: 10.4108/eai.7-11-2017.2273515
|View full text |Cite
|
Sign up to set email alerts
|

Selective Jamming of LoRaWAN using Commodity Hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(50 citation statements)
references
References 0 publications
0
50
0
Order By: Relevance
“…While many attacks and protocol overviews have already been discussed and analysed so far, due to insufficient varied research and results in this area, Denial of Service attacks used in conjunction with Eavesdropping attacks will be the focus in this paper from this point onward. The experiments will aim to build upon some of the work done by Aras [30], but with less emphasis on the Spreading Factor, and more on determining the ideal conditions for an attack, with focus on a more real world scenario, like the normal operational use of multiple channels. An attempt to implement a solution to such attacks will also be carried out.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…While many attacks and protocol overviews have already been discussed and analysed so far, due to insufficient varied research and results in this area, Denial of Service attacks used in conjunction with Eavesdropping attacks will be the focus in this paper from this point onward. The experiments will aim to build upon some of the work done by Aras [30], but with less emphasis on the Spreading Factor, and more on determining the ideal conditions for an attack, with focus on a more real world scenario, like the normal operational use of multiple channels. An attempt to implement a solution to such attacks will also be carried out.…”
Section: Discussionmentioning
confidence: 99%
“…The main documented method of performing DoS attacks in LoRaWAN is via use of signal jamming and replay attacks. Aras et al [30], focused on the effect that the Spreading Factor plays in jamming devices on a LoRaWAN network, but limited the attacks to a device sending on a single channel. The duty cycles used by a device in LoRaWAN will depends on whether the device uses single channel or multiple channels.…”
Section: Threat Model: Denial Of Service In Lorawanmentioning
confidence: 99%
“…Once a decision to jam has been made, a notification is sent to the jammer to jam the packet immediately. To prevent wormhole attack, the authors in [ 67 ] proposed that the two devices (sniffer and jammer) must be kept separate to prevent sniffer from recording the original message and to circumvent jamming of the messages. In sybil attack, a malicious device from intruders illegally creates numerous identities in the network and the identities are used to gain a disproportionately large influence within the network [ 68 ].…”
Section: Lpwan Security Analysismentioning
confidence: 99%
“…The most common DoS attack include DNS flood, Internet Control Message Protocol (ICMP) broadcast and SYN flood [ 75 , 76 ]. The authors in [ 67 ] highlighted jamming attack (a subset of DoS attack) as a major security issue in LoRa and LoRaWAN. With regards to LPWAN availability menaces mitigations, several encryption models, IDSs and other security measures have been proposed in the literature.…”
Section: Lpwan Security Analysismentioning
confidence: 99%
“…Naoui et al [11] compare existing key management protocols for IoT, and propose to add proxy nodes that drive a reputation system to enhance the security mechanisms of LoRaWAN. Aras et al [12] highlight security issues at the physical layer, and develop practical attacks around selective jamming. Countermeasures and suggestions are given to mitigate these attacks.…”
Section: Related Workmentioning
confidence: 99%