Skip to main content

Protecting Gateway from ABP Replay Attack on LoRaWAN

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 554))

Abstract

This paper discusses the problem of replay attacks with the ABP (Activation By Personalisation) authentication method on the LoRaWAN infrastructure and proposes effective gateway protection. To solve the problem, an experiment is replicated that simulates the attacker and is embedded in a real infrastructure environment. Subsequently, a detector is proposed and implemented based on knowledge of attacker’s steps. The paper brings a proposed and verified detection algorithm that is implemented directly on the gate with an attack incident report. The aim of this approach is to prevent server-side spoofing and dosing attack on the end-device.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  2. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  3. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)

    Article  Google Scholar 

  4. Stankovic, J.A.: Research directions for the Internet of Things. IEEE Internet Things J. 1(1), 3–9 (2014). Article no. 6774858

    Article  MathSciNet  Google Scholar 

  5. Bandyopadhyay, D., Sen, J.: Internet of Things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49–69 (2011)

    Article  Google Scholar 

  6. Na, S., Hwang, D., Shin, W., Kim, K.-H.: Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In: 2017 International Conference on Information Networking (ICOIN), pp. 718–720. IEEE (2017). https://doi.org/10.1109/ICOIN.2017.7899580, http://ieeexplore.ieee.org/document/7899580/. Accessed 31 July 2018. ISBN 978-1-5090-5124-3

  7. Tomasin, S., Zulian, S., Vangelista, L.: Security analysis of LoRaWAN join procedure for Internet of Things networks. In: 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 1–6. IEEE (2017). https://doi.org/10.1109/WCNCW.2017.7919091, http://ieeexplore.ieee.org/document/7919091/. Accessed 31 July 2018. ISBN 978-1-5090-5908-9

  8. Sung, W.-J., Ahn, H.-G., Kim, J.-B., Choi, S.-G.: Protecting end-device from replay attack on LoRaWAN. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 167–171. IEEE (2018). https://doi.org/10.23919/ICACT.2018.8323684, https://ieeexplore.ieee.org/document/8323684/. ISBN 979-11-88428-01-4

  9. Miller, R.: LoRa Security - Building a Secure LoRa Solution, MWR Labs. https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-LoRa-securityguide-1.2-2016-03-22.pdf

  10. Yang, X.: LoRaWAN: Vulnerability Analysis and Practical Exploitation (2017). https://repository.tudelft.nl/islandora/object/uuid%3A87730790-6166-4424-9d82-8fe815733f1e

  11. LoRa Alliance: A technical overview of LoRa and LoRaWAN (2015). https://www.lora-alliance.org/what-is-lora

  12. Semtech Sx1272/73: Datasheet (2015). http://www.semtech.com/images/datasheet/sx1272.pdf. Accessed 12 May 2015

  13. IMST GmbH Germany: WiMOD iC880A datasheet (2015). https://wireless-solutions.de/products/radiomodules/ic880a.html

  14. LoRa App Server – open-source LoRaWAN application-server. https://docs.loraserver.io/lora-app-server/. Accessed 05 July 2017

  15. The LoRa Alliance: LoRaWAN 1.1 Specification, October 2017

    Google Scholar 

Download references

Acknowledgment

This work was supported by the Secure Gateway for Internet of Things (SIoT) project No. VI20172020079 funded by the Ministry of the Interior of the Czech Republic and partially by the project Networks and Telecommunications Technologies for Smart Cities under SGS Grant SP2018/59 conducted by the VSB-Technical University of Ostrava, Czech Republic.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Erik Gresak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gresak, E., Voznak, M. (2020). Protecting Gateway from ABP Replay Attack on LoRaWAN. In: Zelinka, I., Brandstetter, P., Trong Dao, T., Hoang Duy, V., Kim, S. (eds) AETA 2018 - Recent Advances in Electrical Engineering and Related Sciences: Theory and Application. AETA 2018. Lecture Notes in Electrical Engineering, vol 554. Springer, Cham. https://doi.org/10.1007/978-3-030-14907-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14907-9_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14906-2

  • Online ISBN: 978-3-030-14907-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics