Impersonating LoRaWAN gateways using Semtech Packet Forwarder

04/24/2019
by   Lukas Simon Laufenberg, et al.
0

Low Power Wide Area Network (LPWAN) technologies like the Long Range Wide Area Network (LoRaWAN) standard provide the foundation of applications realizing communication and intelligent interaction between almost any kind of object. These applications are commonly called Smart Cities and the Internet of Things (IoT). Offering the potential of great benefits for mankind, these applications can also present a significant risk, especially when their security is compromised. This paper's work analyzes the possibility of two particular scenarios of impersonating a LoRaWAN gateway combining existing attacks. Impersonated gateways are of use when exploiting vulnerabilities already shown by other researchers. We give a basic overview about LoRaWAN, the Semtech Packet Forwarder protocol, attacks needed to perform the impersonation, and assumptions made. We explain our attack and propose countermeasures to increase the security of LoRaWAN networks. We show a gateway impersonation is possible in particular circumstances but can be detected and prevented.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/30/2020

Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks

Low Power Wide Area Networks (LPWAN) have been used to support low cost ...
research
12/06/2017

Selective Jamming of LoRaWAN using Commodity Hardware

Long range, low power networks are rapidly gaining acceptance in the Int...
research
01/31/2019

Aggressive Fragmentation Strategy for Enhanced Network Performance in Dense LPWANs

Low Power Wide Area Networks (LPWANs) are gaining ground in the IoT land...
research
05/23/2020

ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation

Low-power wide-area networks (LPWANs) are becoming an integral part of t...
research
12/21/2017

FLIP: Federation support for Long range low power Internet of things Protocols

There is growing interest in the Internet of Things (IoT) and especially...
research
04/15/2020

Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks

As the Routing Protocol for Low Power and Lossy Networks (RPL) became th...
research
09/30/2021

RFID Exploitation and Countermeasures

Radio Frequency Identification (RFID) systems are among the most widespr...

Please sign up or login with your details

Forgot password? Click here to reset