Abstract

The Low-Power Wide-Area Network (LPWA) has already started to gain a notorious adoption in the Internet of Things (IoT) landscape due to its enormous potential. It is already employed in a wide variety of scenarios involving parking lot occupancy, package delivery, smart irrigation, smart lightning, fire detection, etc. If messages from LPWA devices can be manipulated or blocked, this will violate the integrity of the collected information and lead to unobserved events (e.g., fire, leakage). This paper explores the possibility that violates message integrity by applying a reactive jamming technique that disrupts a Long Range Wide Area Network (LoRaWAN) network. As shown in this paper, using low-cost commodity hardware based on Arduino platform, an attacker can easily mount such an attack that would result in completely shutting down the entire LoRaWAN network with high probability. Several countermeasures are introduced to reduce the possibility of jamming attacks.

Highlights

  • Introduction on Long Range Wide Area Network (LoRaWAN) NetworkElectronicsInternet of Things (IoT) has become an indispensable element of information technology, predicted to continue to grow at a rapid rate

  • LoRa (Long Range) wireless technology has proven to be a good candidate for communication over long distances regarding IoT, and the reason is that LoRa provides control and management capabilities for IoT devices over long distances with very low power consumption, greatly extending the battery life of devices [8,9]

  • The long-range nature of LoRaWAN allows adversaries to violate the integrity of legitimate traffic by injecting messages into the network, causing collisions at the receiver side, thereby blocking potential critical messages

Read more

Summary

CSS Modulation

LoRa utilizes Chirp Spread Spectrum (CSS) modulation [25] for message transmission from the end node to the gateway (and otherwise). Several frequency bands are supported for LoRa transmission, and they range from 137 MHz up to 1020 MHz. LoRa modem uses Coding Rate for protecting against bursts of interference. To determine the number of data that can be encoded by a single symbol, SF determines the duration of each chirp/chip, and the transmission time of the entire packet. Preamble is combined with an additional 4.25 symbols added by LoRa modem, which results in a synchronization word. The preamble is followed by a header part of the packet with a coding rate set to 4/8, which is followed by a payload with size ranging from 1 to 255 bytes

LoRaWAN
LoRaWAN Architecture
End Devices
Structure of the LoRaWAN Packet
Analysis of LoRa Communication for the Implementation of Reactive
Attack Strategy 1
Attack Strategy 2
Attack Strategy 3
Countermeasures
Limitations and Future
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call