Analysis of Lorawan Protocol and Attacks Against Lorawan-Based IoT Devices

Authors

DOI:

https://doi.org/10.58190/ijamec.2024.95

Keywords:

IoT, IoTSecurity, LoRaWAN, Risk Analysis, LPWAN

Abstract

In this study, the LoRaWAN protocol, which is a promising candidate for Low-Power Wide Area Network (LPWAN) in terms of network capacity, network security, battery life, low cost and data transmission capabilities, has been selected to examine and analyze its security risks. The Internet of Things (IoT) concept has been explored, and various network types and architectures have been investigated and compared with the LoRaWAN protocol. Subsequently, attacks on IoT networks, the countermeasures taken by manufacturers, and relevant academic studies on this topic have been examined. The main subject of the study, LoRaWAN, has been explained in terms of its versions, architecture, components, classes, and network layers. Vulnerabilities, security risks, and types of attacks have been categorized and thoroughly explained and a risk assessment has been conducted to evaluate the impact of these attack types. Based on the findings, solutions to prevent or mitigate attacks for four specific types of attacks against the LoRaWAN protocol have been proposed and presented to end users.

Downloads

Download data is not yet available.

References

Ashton K. "That ‘Internet of things’ thing". https://www.rfidjournal.com/articles/view?4986 (25.05.2021).

Nordrum A. "Popular internet of things forecast of 50 billion devices by 2020 is outdated". https://spectrum.ieee.org/tech-talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated (25.05.2021).

Evans D. "The internet of things: how the next evolution of the internet is changing everything". Cisco, San Jose Canada, 2011.

Cisco, "Cisco visual networking index: forecast and trends,2017–2022". https://cyrekdigital.com/uploads/content/files/white-paper-c11-741490.pdf (25.05.2021).

Cisco, "Cisco visual networking index: forecast and trends,2017–2022". https://cyrekdigital.com/uploads/content/files/white-paper-c11-741490.pdf (25.05.2021).

Marcel J. "Wireless connectivity options for iot applications". https://www.bluetooth.com/blog/wireless-connectivity-options-for-iot-applications. (25.05.2021).

Harada R, Sotter E. "Automated monitoring for inspections and condition-based maintenance- Part III: Industrial IoT networks". https://electricenergyonline.com/energy/magazine/1166/article/Automated-Monitoring-for-Inspections-and-Condition-based-Maintenance-Part-III-Industrial-IoT-Networks.htm (25.05.2021).

Kumar R, Au T.W, Susanty W, Suhaili H. "Exploring data security and privacy issues in internet of things based on five-layer architecture". International Journal of Communication Networks and Information Security, 12(1), 108-121, 2020.

Pereira N. Gidlund M. Butun I. "Security risk analysis of lorawan and future directions" Future Internet , 3(1), 11, 2019

Dazell T. "Many time pad attack - crib drag". http://travisdazell.blogspot.com/2012/11/many-time-pad-attack-crib-drag.html (08.04.2021).

Yang, Xueying, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. "Security vulnerabilities in LoRaWAN." In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 129-140. IEEE, 2018.

Ruotsalainen, Henri, Guanxiong Shen, Junqing Zhang, and Radek Fujdiak. "LoRaWAN physical layer-based attacks and countermeasures, a review." Sensors 22, no. 9 (2022): 3127.

Downloads

Published

30-06-2024

Issue

Section

Research Articles

How to Cite

[1]
“Analysis of Lorawan Protocol and Attacks Against Lorawan-Based IoT Devices”, J. Appl. Methods Electron. Comput., vol. 12, no. 2, pp. 33–39, Jun. 2024, doi: 10.58190/ijamec.2024.95.

Similar Articles

81-89 of 89

You may also start an advanced similarity search for this article.