2021
DOI: 10.3390/app11167642
|View full text |Cite
|
Sign up to set email alerts
|

Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study

Abstract: The low-power wide-area (LPWA) technologies, which enable cost and energy-efficient wireless connectivity for massive deployments of autonomous machines, have enabled and boosted the development of many new Internet of things (IoT) applications; however, the security of LPWA technologies in general, and specifically those operating in the license-free frequency bands, have received somewhat limited attention so far. This paper focuses specifically on the security and privacy aspects of one of the most popular … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…These discoveries led the authors to suggest amendments to the Lo-RaWAN specification to mitigate such attacks. Another framework [21] merges standalone LoRaWAN transceivers with software-defined radio (SDR) and GNU Radio, enabling them to simulate a man-in-the-middle attack.…”
Section: Related Workmentioning
confidence: 99%
“…These discoveries led the authors to suggest amendments to the Lo-RaWAN specification to mitigate such attacks. Another framework [21] merges standalone LoRaWAN transceivers with software-defined radio (SDR) and GNU Radio, enabling them to simulate a man-in-the-middle attack.…”
Section: Related Workmentioning
confidence: 99%
“…This complex approach provides scalability, rented access data gateway networking, optimal coverage, better network security and better data rates, where blockchain reinforces the architecture's decentralized behaviour [29]. Test stands are being built for the experimental validation and security of such networks [30]. Using static keys (as most encryption software does) to authenticate and encrypt the node is not as secure as session keys in LoRaWAN, work is underway on a centralized lightweight session key mechanism for Blom-Yang (BYka) key agreement standards [31].…”
Section: Solutionsmentioning
confidence: 99%
“… Man-in-the-Middle: Figure 2 shows a diagram of Man-In-the-Middle (MITM) attacks. MITM attackers secretly relay and manipulate the communication between two IoT systems, the remote devices, and eavesdrop the private communications among the parties [ 49 , 50 ]. Privacy leakage: Data protection and privacy should be a priority in IoT system communication.…”
Section: Iot System and Security Issuesmentioning
confidence: 99%