A4 Vertaisarvioitu artikkeli konferenssijulkaisussa
Security of LoRaWAN v1.1 in Backward Compatibility Scenarios
Tekijät: Tahsin C.M. Dönmez, Ethiopia Nigussie
Toimittaja: Elhadi Shakshuki, Ansar Yasar
Konferenssin vakiintunut nimi: International Conference on Mobile Systems and Pervasive Computing
Kustantaja: Elsevier B.V.
Julkaisuvuosi: 2018
Journal: Procedia Computer Science
Kokoomateoksen nimi: The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops
Tietokannassa oleva lehden nimi: Procedia Computer Science
Sarjan nimi: Procedia Computer Science
Vuosikerta: 134
Aloitussivu: 51
Lopetussivu: 58
ISSN: 1877-0509
DOI: https://doi.org/10.1016/j.procs.2018.07.143
Rinnakkaistallenteen osoite: https://research.utu.fi/converis/portal/detail/Publication/35851598
We present security vulnerabilities of LoRaWAN v1.1 in backward
compatibility scenarios and propose countermeasures. Novel low-power
wireless communication technologies are continuously introduced into the
IoT ecosystem, while the existing ones continue their evolution by
adding new features and fixing known problems. Since most of IoT-based
applications involve communication of sensitive data with remote users,
it is crucial to scrutinize the security of the emerging low-power
wireless communication technologies. LoRaWAN is a Low Power Wide Area
Network (LPWAN) protocol that is optimized for wireless battery-powered
IoT devices. The current LoRaWAN v1.1 states only one possible backward
compatibility scenario without defining all the associated security
behaviors and their implications for the system’s overall security. This
work examines the applicability of v1.0.2 attacks in fall-back cases by
consolidating the vulnerabilities of v1.0.2 and the resulting attacks.
After determining the possible attacks, countermeasures to prevent DoS
attacks that target the join procedure, replay of data, and eavesdropping in backward compatibility scenarios are proposed.
Ladattava julkaisu This is an electronic reprint of the original article. |