首页> 外文会议>IEEE Wireless Communications and Networking Conference Workshops >Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks
【24h】

Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks

机译:物联网网络LoRaWAN加入程序的安全性分析

获取原文

摘要

Currently one of the most established protocols for machine to machine (M2M) communications is LoRaWAN, designed to provide low power wide area network with features specifically needed to support low-cost, mobile, secure bidirectional communication for the Internet of Things (IoT). In this context security is of pivotal importance, as IoT constitutes a pervasive network of devices highly integrated with our daily life. In this paper we examine key security issues of the procedure used in LoRaWAN to allow an end device to establish a connection with the network server. We have identified vulnerabilities in this protocol, in particular with reference to the use of a random number in the join procedure packet, meant to prevent replay attacks. We first discuss the options that a network server has when detecting a replay attack and then we examine a) the possibility that a legitimate receiver is considered an attacker because of the random number generation issues and b) the possibility for an attacker to exploit this protocol to generate a denial of service (DoS). A wide set of experiments has been conducted using a widely used LoRaWAN chip showing the vulnerabilities of the protocol.
机译:LoRaWAN是目前最成熟的机器对机器(M2M)通信协议之一,旨在为低功耗广域网提供特定功能,以支持物联网(IoT)的低成本,移动,安全双向通信。在这种情况下,安全性至关重要,因为物联网是与我们的日常生活高度集成的无处不在的设备网络。在本文中,我们研究了LoRaWAN中允许终端设备与网络服务器建立连接的过程的关键安全问题。我们已经确定了该协议中的漏洞,尤其是在加入过程数据包中使用随机数的目的,目的是防止重放攻击。我们首先讨论检测重播攻击时网络服务器所具有的选项,然后我们检查a)由于随机数生成问题而将合法接收者视为攻击者的可能性,以及b)攻击者利用此协议的可能性生成拒绝服务(DoS)。使用广泛使用的LoRaWAN芯片已进行了广泛的实验,显示了该协议的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号