Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3265863.3265882acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

General Security Considerations of LoRaWAN Version 1.1 Infrastructures

Published: 25 October 2018 Publication History

Abstract

We assess the security mechanisms defined in the LoRaWAN specification and describe own research to show, whether those security mechanisms are sufficient. For this, we explain typical attacks on radiobased networks. We further show which precautions are necessary not to undermine these measures and whether additional security measures may be necessary.

References

[1]
2006. IEEE Standard for Information technology -- Local and metropolitan area networks -- Specific requirements -- Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANs). IEEE Std 802.15.4--2006 (Revision of IEEE Std 802.15.4--2003) (Sept 2006), 1--320.
[2]
Alper Yegin (Actility), Editor. 2017. LoRaWAN Backend Interfaces Specification - Version 1.0. LoRa Alliance, Inc., 3855 SW 153rd Drive, Beaverton, OR 97003, USA.
[3]
Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. 2017. Exploring The Security Vulnerabilities of LoRa. In Cybernetics (CYBCONF), 2017 3rd IEEE International Conference on. IEEE, 1--6.
[4]
IEEE Standards Association et al. 2010. Guidelines for 64-bit Global Identifier (EUI-64 (TM)). Registration Authority Tutorials, April (2010).
[5]
Mihir Bellare, Joe Kilian, and Phillip Rogaway. 2000. The security of the cipher block chaining message authentication code. J. Comput. System Sci. 61, 3 (2000), 362--399.
[6]
John Black and Phillip Rogaway. 2001. A Suggestion for handling Arbitrary-Length Messages with the CBC MAC. In NIST Second Modes of Operation Workshop, August.
[7]
Norbert Blenn and Fernando Kuipers. 2017. LoRaWAN in the wild: Measurements from the things network. arXiv preprint arXiv:1706.03086 (2017).
[8]
Morris J Dworkin. 2016. Recommendation for block cipher modes of operation: The CMAC mode for authentication. Technical Report.
[9]
Jakob Jonsson. 2002. On the security of CTR+ CBC-MAC. In International Workshop on Selected Areas in Cryptography. Springer, 76--93.
[10]
Alfred J Menezes, Jonathan Katz, Paul C Van Oorschot, and Scott A Vanstone. 1996. Handbook of applied cryptography. CRC press.
[11]
SeungJae Na, DongYeop Hwang, WoonSeob Shin, and Ki-Hyung Kim. 2017. Scenario and countermeasure for replay attack using join request messages in Lo- RaWAN. In Information Networking (ICOIN), 2017 International Conference on. IEEE, 718--720.
[12]
Nicolas Sornin (Semtech), Editor. 2017. LoRaWAN Specification - Version 1.1. LoRa Alliance, Inc., 3855 SW 153rd Drive, Beaverton, OR 97003, USA.
[13]
JH. Song, R. Poovendran, J. Lee, and T. Iwata. 2006. The AES-CMAC Algorithm. RFC 4493. RFC Editor. https://www.rfc-editor.org/rfc/rfc4493.txt
[14]
Stefano Tomasin, Simone Zulian, and Lorenzo Vangelista. 2017. Security analysis of lorawan join procedure for internet of things networks. In Wireless Communications and Networking Conference Workshops (WCNCW), 2017 IEEE. IEEE, 1--6.
[15]
D. Whiting, R. Housley, and N. Ferguson. 2003. Counter with CBC-MAC (CCM). RFC 3610. RFC Editor. https://www.rfc-editor.org/rfc/rfc3610.txt

Cited By

View all
  • (2022)Implementation of lightweight block cipher for IoT communication moduleProceedings of the 7th International Conference on Sustainable Information Engineering and Technology10.1145/3568231.3568263(142-147)Online publication date: 22-Nov-2022
  • (2022) LoRaWAN security issues and mitigation options by the example of agricultural IoT scenariosTransactions on Emerging Telecommunications Technologies10.1002/ett.445233:5Online publication date: 27-Jan-2022
  • (2020)Enhancing Key Management in LoRaWAN with Permissioned BlockchainSensors10.3390/s2011306820:11(3068)Online publication date: 29-May-2020
  • Show More Cited By

Index Terms

  1. General Security Considerations of LoRaWAN Version 1.1 Infrastructures

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiWac'18: Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access
      October 2018
      140 pages
      ISBN:9781450359627
      DOI:10.1145/3265863
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 October 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. lorawan
      2. network
      3. security

      Qualifiers

      • Short-paper

      Acceptance Rates

      Overall Acceptance Rate 83 of 272 submissions, 31%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)15
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 10 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Implementation of lightweight block cipher for IoT communication moduleProceedings of the 7th International Conference on Sustainable Information Engineering and Technology10.1145/3568231.3568263(142-147)Online publication date: 22-Nov-2022
      • (2022) LoRaWAN security issues and mitigation options by the example of agricultural IoT scenariosTransactions on Emerging Telecommunications Technologies10.1002/ett.445233:5Online publication date: 27-Jan-2022
      • (2020)Enhancing Key Management in LoRaWAN with Permissioned BlockchainSensors10.3390/s2011306820:11(3068)Online publication date: 29-May-2020
      • (2020)Verification Schemes of Multi-SIM Devices in Mobile Communication SystemsProceedings of the 18th ACM Symposium on Mobility Management and Wireless Access10.1145/3416012.3424620(91-97)Online publication date: 16-Nov-2020
      • (2019)Energy Attack in LoRaWANProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3340525(1-6)Online publication date: 26-Aug-2019

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media