Abstract
This paper discusses the problem of replay attacks with the ABP (Activation By Personalisation) authentication method on the LoRaWAN infrastructure and proposes effective gateway protection. To solve the problem, an experiment is replicated that simulates the attacker and is embedded in a real infrastructure environment. Subsequently, a detector is proposed and implemented based on knowledge of attacker’s steps. The paper brings a proposed and verified detection algorithm that is implemented directly on the gate with an attack incident report. The aim of this approach is to prevent server-side spoofing and dosing attack on the end-device.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)
Stankovic, J.A.: Research directions for the Internet of Things. IEEE Internet Things J. 1(1), 3–9 (2014). Article no. 6774858
Bandyopadhyay, D., Sen, J.: Internet of Things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49–69 (2011)
Na, S., Hwang, D., Shin, W., Kim, K.-H.: Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In: 2017 International Conference on Information Networking (ICOIN), pp. 718–720. IEEE (2017). https://doi.org/10.1109/ICOIN.2017.7899580, http://ieeexplore.ieee.org/document/7899580/. Accessed 31 July 2018. ISBN 978-1-5090-5124-3
Tomasin, S., Zulian, S., Vangelista, L.: Security analysis of LoRaWAN join procedure for Internet of Things networks. In: 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 1–6. IEEE (2017). https://doi.org/10.1109/WCNCW.2017.7919091, http://ieeexplore.ieee.org/document/7919091/. Accessed 31 July 2018. ISBN 978-1-5090-5908-9
Sung, W.-J., Ahn, H.-G., Kim, J.-B., Choi, S.-G.: Protecting end-device from replay attack on LoRaWAN. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 167–171. IEEE (2018). https://doi.org/10.23919/ICACT.2018.8323684, https://ieeexplore.ieee.org/document/8323684/. ISBN 979-11-88428-01-4
Miller, R.: LoRa Security - Building a Secure LoRa Solution, MWR Labs. https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-LoRa-securityguide-1.2-2016-03-22.pdf
Yang, X.: LoRaWAN: Vulnerability Analysis and Practical Exploitation (2017). https://repository.tudelft.nl/islandora/object/uuid%3A87730790-6166-4424-9d82-8fe815733f1e
LoRa Alliance: A technical overview of LoRa and LoRaWAN (2015). https://www.lora-alliance.org/what-is-lora
Semtech Sx1272/73: Datasheet (2015). http://www.semtech.com/images/datasheet/sx1272.pdf. Accessed 12 May 2015
IMST GmbH Germany: WiMOD iC880A datasheet (2015). https://wireless-solutions.de/products/radiomodules/ic880a.html
LoRa App Server – open-source LoRaWAN application-server. https://docs.loraserver.io/lora-app-server/. Accessed 05 July 2017
The LoRa Alliance: LoRaWAN 1.1 Specification, October 2017
Acknowledgment
This work was supported by the Secure Gateway for Internet of Things (SIoT) project No. VI20172020079 funded by the Ministry of the Interior of the Czech Republic and partially by the project Networks and Telecommunications Technologies for Smart Cities under SGS Grant SP2018/59 conducted by the VSB-Technical University of Ostrava, Czech Republic.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gresak, E., Voznak, M. (2020). Protecting Gateway from ABP Replay Attack on LoRaWAN. In: Zelinka, I., Brandstetter, P., Trong Dao, T., Hoang Duy, V., Kim, S. (eds) AETA 2018 - Recent Advances in Electrical Engineering and Related Sciences: Theory and Application. AETA 2018. Lecture Notes in Electrical Engineering, vol 554. Springer, Cham. https://doi.org/10.1007/978-3-030-14907-9_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-14907-9_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14906-2
Online ISBN: 978-3-030-14907-9
eBook Packages: EngineeringEngineering (R0)