当前位置: X-MOL 学术IET Inf. Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
IET Information Security ( IF 1.4 ) Pub Date : 2020-06-22 , DOI: 10.1049/iet-ifs.2019.0447
Max Ingham 1 , Jims Marchang 1 , Deepayan Bhowmik 2
Affiliation  

Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security are less explored. The IoT devices are light weight in nature and have low computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security flaws. This study aims to explore the security vulnerabilities of IoT devices particularly that use low power wide area networks (LPWANs). In this work, long range wide area network (LoRaWAN) based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was designed and simulated with the use of a predictive model of the device data generation. The study demonstrated that by predicting the data generation model, the jamming attack can be carried out to block devices from sending data successfully. This research will aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of IoT networks in general.

中文翻译:

LoRaWAN中的物联网安全漏洞和预测性信号干扰攻击分析

物联网(IoT)凭借其灵活性,可用性,多样化的适用性和易于部署的特性,近年来获得了普及。但是,与安全有关的问题很少被探讨。物联网设备本质上重量轻,具有低计算能力,低电池寿命和低内存。由于合并安全功能会消耗大量资源,因此经常发现IoT设备受到的保护较少,并且由于高调的安全漏洞,最近有越来越多的IoT设备受到例行攻击。这项研究旨在探讨IoT设备的安全漏洞,尤其是使用低功耗广域网(LPWAN)的设备。在这项工作中,将仔细检查基于远程广域网(LoRaWAN)的IoT安全漏洞并找出漏洞。使用设备数据生成的预测模型来设计和模拟攻击。研究表明,通过预测数据生成模型,可以进行干扰攻击以阻止设备成功发送数据。这项研究将有助于物联网网络的LoRaWAN和LPWAN功能的任何必要对策和缓解措施的持续开发。
更新日期:2020-08-20
down
wechat
bug