scholarly journals A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol

Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5122 ◽  
Author(s):  
Shu-Yang Gao ◽  
Xiao-Hong Li ◽  
Mao-De Ma

Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specification and the limited consumption performance of devices to carry out security attacks such as replay attacks. In the process of the over-the-air-activation (OTAA) for LoRa nodes, attackers can modify the data because the data is transmitted in plain text. If the user’s root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network. To solve this security flaw in LoRaWAN, we propose a countermeasure called Secure-Packet-Transmission scheme (SPT) which works based on the LoRaWAN standard v1.1 to prevent replay attacks when an attacker has obtained the root key. The proposed scheme redefines the format of join-request packet, add the new One Time Password (OTP) encrypted method and changes the transmission strategy in OTAA between LoRa nodes and network server. The security evaluation by using the Burrows-Abadi-Needham logic (BAN Logic) and the Scyther shows that the security goal can be achieved. This paper also conducts extensive experiments by simulations and a testbed to perform feasibility and performance analysis. All results demonstrate that SPT is lightweight, efficient and able to defend against malicious behavior.

Author(s):  
Hongqiang Li ◽  
Dongyan Zhao ◽  
Xiaoke Tang ◽  
Jie Gan ◽  
Xu Zhao ◽  
...  

With the rapid development of IoT technology in recent years, higher requirements have been put forward for wireless communication technology. Low Power Wide Area Network (LPWAN) technology is emerging rapidly, the technology is characterized by low power consumption, low bandwidth, long-distance, and a large number of connections, and is specifically designed for Internet of Things applications. LoRa (Low Power Long Range Transceiver), as a typical representative of LPWAN technology, has been widely concerned and studied. This paper analyzes the performance of LoRa modulation in the tree topology network and analyzes the performance of LoRa modulation in the imperfect environment for point-to-point communication and multipoint-to-point communication. From theoretical analysis and performance simulation, it can be seen that the influence of frequency offset or multipath fading on LoRa signal is very obvious. However, when LoRa modulation is used for networking, multi-user interference will be introduced. Under the influence of many imperfect factors, the signal receiver performance of LoRa modulation will be difficult to guarantee. Because of these effects, Coordinated Multiple Points based on Timing Delay (DCoMP) is presented. Multiple nodes close to each other send the same data to the target node. Due to the inaccurate synchronization between nodes, there will be a certain relative delay when sending signals to the same target node. After the receiving node combines the signals of multiple nodes according to different relative delays, the reception performance of the signals can be improved. At the same time, the cooperative node can also actively adjust the signal sending time to improve the reception performance of the receiving node signal merging algorithm. LoRa modulation, by using DCoMP transmission, improves the reception of signals and thus the overall capacity of the system. Through the analysis of multipoint communication and single point communication, this paper is of great help to LoRa network deployment.


Author(s):  
Olof Magnusson ◽  
Rikard Teodorsson ◽  
Joakim Wennerberg ◽  
Stig Arne Knoph

LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.


TecnoLógicas ◽  
2019 ◽  
Vol 22 (46) ◽  
pp. 185-194
Author(s):  
Andrés F. Bravo-Montoya ◽  
Jefersson S. Rondón-Sanabria ◽  
Elvis E. Gaona-García

This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1185 ◽  
Author(s):  
Xiaopeng Tan ◽  
Zhen Zuo ◽  
Shaojing Su ◽  
Xiaojun Guo ◽  
Xiaoyong Sun

With the rapid development of information technology and the increasing application of UAV in various fields, the security problems of unmanned aerial vehicle (UAV) communication network have become increasingly prominent. It has become an important scientific challenge to design a routing protocol that can provide efficient and reliable node to node packet transmission. In this paper, an efficient Digital Signature algorithm based on the elliptic curve cryptosystem is applied to routing protocol, and an improved security method suitable for on-demand routing protocol is proposed. The UAV communication network was simulated through the NS2 simulation platform, and the execution efficiency and safety of the improved routing protocol were analyzed. In the simulation experiment, the routing protocols of ad-hoc on demand distance vector (AODV), security ad-hoc on demand distance vector (SAODV), and improved security ad-hoc on demand distance vector (ISAODV) are compared in terms of the performance indicators of packet delivery rate, throughput, and end-to-end delay under normal conditions and when attacked by malicious nodes. The simulation results show that the improved routing protocol can effectively improve the security of the UAV communication network.


2012 ◽  
Vol 4 ◽  
pp. 19-21
Author(s):  
Jun Lei Zhang ◽  
Hui Min Zhang ◽  
Cui Min Lian ◽  
Rong Li

With the rapid development of computer network technology, wireless networks have developed to wireless wide area network from a single wireless personal area network. Expansion of coverage was spread from a few meters to a global range and transmission speed was also doubled. The wireless network is gradually used into complicated module network environment, especially in the field of medical treatment, depending on the flexibility and the sound extendibility of its module network. This article is to introduce the wireless LAN technique and its character, and also to express its scientific use in the care.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Shichang Xuan ◽  
Ming Jin ◽  
Xin Li ◽  
Zhaoyuan Yao ◽  
Wu Yang ◽  
...  

The rapid development in network technology has resulted in the proliferation of Internet of Things (IoT). This trend has led to a widespread utilization of decentralized data and distributed computing power. While machine learning can benefit from the massive amount of IoT data, privacy concerns and communication costs have caused data silos. Although the adoption of blockchain and federated learning technologies addresses the security issues related to collusion attacks and privacy leakage in data sharing, the “free-rider attacks” and “model poisoning attacks” in the federated learning process require auditing of the training models one by one. However, that increases the communication cost of the entire training process. Hence, to address the problem of increased communication cost due to node security verification in the blockchain-based federated learning process, we propose a communication cost optimization method based on security evaluation. By studying the verification mechanism for useless or malicious nodes, we also introduce a double-layer aggregation model into the federated learning process by combining the competing voting verification methods and aggregation algorithms. The experimental comparisons verify that the proposed model effectively reduces the communication cost of the node security verification in the blockchain-based federated learning process.


2011 ◽  
Vol 480-481 ◽  
pp. 1603-1606
Author(s):  
Ming Wang Shi ◽  
Yan Zhou

With the computer and the rapid development of information technology, The plant disease intelligence diagnosis and the plant disease early warning network is possible. In this paper, relying on the Internet, the realization of intelligent online plant disease diagnosis, early warning, prevention and other information query and forecasting capabilities. The database base on Internet-based wide area network environment and the help of webGIS technology, including diagnostic module, check module and the prediction module. The intelligent prognosis is tested to the extent and happening of plant diseases, for example, Wheat, cotton, tomatoes and other 12 kinds of plant diseases, and epidemic curve is given. To disease diagnosis and prediction of the professional, technical problems become easy, for the effective control of plant diseases, provide a reference.


Author(s):  
Taghi Shahgholi ◽  
Amir Sheikhahmadi ◽  
Keyhan Khamforoosh ◽  
Sadoon Azizi

AbstractIncreased number of the vehicles on the streets around the world has led to several problems including traffic congestion, emissions, and huge fuel consumption in many regions. With advances in wireless and traffic technologies, the Intelligent Transportation System (ITS) has been introduced as a viable solution for solving these problems by implementing more efficient use of the current infrastructures. In this paper, the possibility of using cellular-based Low-Power Wide-Area Network (LPWAN) communications, LTE-M and NB-IoT, for ITS applications has been investigated. LTE-M and NB-IoT are designed to provide long range, low power and low cost communication infrastructures and can be a promising option which has the potential to be employed immediately in real systems. In this paper, we have proposed an architecture to employ the LPWAN as a backhaul infrastructure for ITS and to understand the feasibility of the proposed model, two applications with low and high delay requirements have been examined: road traffic monitoring and emergency vehicle management. Then, the performance of using LTE-M and NB-IoT for providing backhaul communication infrastructure has been evaluated in a realistic simulation environment and compared for these two scenarios in terms of end-to-end latency per user. Simulation of Urban MObility has been used for realistic traffic generation and a Python-based program has been developed for evaluation of the communication system. The simulation results demonstrate the feasibility of using LPWAN for ITS backhaul infrastructure mostly in favor of the LTE-M over NB-IoT.


Electronics ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 940
Author(s):  
Nicoleta Cristina Gaitan

Recent market studies show that the market for remote monitoring devices of different medical parameters will grow exponentially. Globally, more than 4 million individuals will be monitored remotely from the perspective of different health parameters by 2023. Of particular importance is the way of remote transmission of the information acquired from the medical sensors. At this time, there are several methods such as Bluetooth, WI-FI, or other wireless communication interfaces. Recently, the communication based on LoRa (Long Range) technology has had an explosive development that allows the transmission of information over long distances with low energy consumption. The implementation of the IoT (Internet of Things) applications using LoRa devices based on open Long Range Wide-Area Network (LoRaWAN) protocol for long distances with low energy consumption can also be used in the medical field. Therefore, in this paper, we proposed and developed a long-distance communication architecture for medical devices based on the LoRaWAN protocol that allows data communications over a distance of more than 10 km.


Sign in / Sign up

Export Citation Format

Share Document