ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation

05/23/2020
by   Frank Hessel, et al.
0

Low-power wide-area networks (LPWANs) are becoming an integral part of the Internet of Things. As a consequence, businesses, administration, and, subsequently, society itself depend on the reliability and availability of these communication networks. Released in 2015, LoRaWAN gained popularity and attracted the focus of security research, revealing a number of vulnerabilities. This lead to the revised LoRaWAN 1.1 specification in late 2017. Most of previous work focused on simulation and theoretical approaches. Interoperability and the variety of implementations complicate the risk assessment for a specific LoRaWAN network. In this paper, we address these issues by introducing ChirpOTLE, a LoRa and LoRaWAN security evaluation framework suitable for rapid iteration and testing of attacks in testbeds and assessing the security of real-world networks.We demonstrate the potential of our framework by verifying the applicability of a novel denial-of-service attack targeting the adaptive data rate mechanism in a testbed using common off-the-shelf hardware. Furthermore, we show the feasibility of the Class B beacon spoofing attack, which has not been demonstrated in practice before.

READ FULL TEXT
research
04/24/2019

Impersonating LoRaWAN gateways using Semtech Packet Forwarder

Low Power Wide Area Network (LPWAN) technologies like the Long Range Wid...
research
09/09/2021

Automated Security Assessment for the Internet of Things

Internet of Things (IoT) based applications face an increasing number of...
research
06/24/2019

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

An attack graph is a method used to enumerate the possible paths that an...
research
05/12/2022

Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments

In today's modern farm, an increasing number of agricultural systems and...
research
08/14/2021

Security Assessment Rating Framework for Enterprises using MITRE ATT CK Matrix

Threats targeting cyberspace are becoming more prominent and intelligent...
research
12/06/2017

Selective Jamming of LoRaWAN using Commodity Hardware

Long range, low power networks are rapidly gaining acceptance in the Int...
research
05/11/2023

Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting

Due to an increase in the availability of cheap off-the-shelf radio hard...

Please sign up or login with your details

Forgot password? Click here to reset