Refereed article in conference proceedings (A4)

Security of Join Procedure and its Delegation in LoRaWAN v1.1




List of AuthorsTahsin C.M. Dönmez, Ethiopia Nigussie

EditorsElhadi Shakshuki, Ansar Yasar

Conference nameInternational Conference on Mobile Systems and Pervasive Computing

PublisherElsevier B.V.

Publication year2018

JournalProcedia Computer Science

Book title *The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops

Journal name in sourceProcedia Computer Science

Volume number134

Start page204

End page211

ISSN1877-0509

DOIhttp://dx.doi.org/10.1016/j.procs.2018.07.202

Self-archived copy’s web addresshttps://research.utu.fi/converis/portal/detail/Publication/35851434


Abstract

We examine the security features of LoRaWAN v1.1 and propose
countermeasures for the determined security problems. LoRaWAN is among
the emerging wireless communication technologies for the
internet-of-things (IoT) that provide long-range connectivity for
low-power IoT devices. As most IoT based applications operate without
human intervention and deal with sensitive data, it is crucial to keep
the security of LoRaWAN under scrutiny. The examined features in this
work are key management, the newly introduced delegation of join
procedure to network operators, backward compatibility, and replay
protection for join procedure. The evaluation of key management exposes
the fact that LoRaWAN v1.1 does not provide forward secrecy. The closer
study of the join procedure delegation with backward compatibility
reveals that they cannot securely coexist. The examination of join
procedure demonstrates that when the assumption of trustworthy network
server fails, not only integrity but also confidentiality of application
data may be compromised. To overcome these issues, we proposed
countermeasures that prevent the compromise of integrity and
confidentiality of application data in the cases of join procedure
delegation and malicious network server.


Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.




Last updated on 2022-07-04 at 17:01