LoRaWAN Security Analysis : An Experimental Evaluation of Attacks
Low-power wide-area networks (LPWAN) are becoming the wireless backbone for modern business processes and municipal administration. LoRaWAN, which stands for long-range wide-area network, is a recent medium access control (MAC) layer protocol competing for this market. It stands out by its open oper...
Main Author: | |
---|---|
Format: | Dissertation |
Language: | en |
Published: |
2021
|
Online Access: | https://tuprints.ulb.tu-darmstadt.de/17550/1/LoRaWAN-Security-Analysis.pdf Hessel, Frank <http://tuprints.ulb.tu-darmstadt.de/view/person/Hessel=3AFrank=3A=3A.html> (2021): LoRaWAN Security Analysis : An Experimental Evaluation of Attacks. (Publisher's Version)Darmstadt, Technische Universität, DOI: 10.26083/tuprints-00017550 <https://doi.org/10.26083/tuprints-00017550>, [Master Thesis] |
id |
ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-17550 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-175502021-02-10T05:17:20Z http://tuprints.ulb.tu-darmstadt.de/17550/ LoRaWAN Security Analysis : An Experimental Evaluation of Attacks Hessel, Frank Low-power wide-area networks (LPWAN) are becoming the wireless backbone for modern business processes and municipal administration. LoRaWAN, which stands for long-range wide-area network, is a recent medium access control (MAC) layer protocol competing for this market. It stands out by its open operator model and a novel modulation technique. With LoRaWAN and other communication technologies are becoming a dependency for more and more aspects of today's society, the question for their security and reliability comes up. Previous researches on the topic have already revealed vulnerabilities in the first LoRaWAN specification, which have been partly mitigated in the most recent LoRaWAN 1.1. However, related studies often provide only theoretical results or consider practical scenarios only on a specific, small scale. In this thesis, we present a LoRaWAN security evaluation framework that allows field-testing the security and reliability characteristics of actual LoRaWAN deployments. This provides not only reproducible results but also allows making a comparison between defined versions of the specification and LoRaWAN software. Before expounding implementation details, we provide a literature survey on LoRaWAN vulnerabilities and attacks to identify interesting aspects for further evaluation. From our experimental results, we show that jamming is a serious threat to the availability of LoRaWAN networks. Furthermore, we demonstrate the practical applicability of two replay attacks against a selection of LoRaWAN software and illustrate why they will remain relevant for years due to backward compatibility. 2021 Master Thesis NonPeerReviewed text CC-BY 4.0 International - Creative Commons, Attribution https://tuprints.ulb.tu-darmstadt.de/17550/1/LoRaWAN-Security-Analysis.pdf Hessel, Frank <http://tuprints.ulb.tu-darmstadt.de/view/person/Hessel=3AFrank=3A=3A.html> (2021): LoRaWAN Security Analysis : An Experimental Evaluation of Attacks. (Publisher's Version)Darmstadt, Technische Universität, DOI: 10.26083/tuprints-00017550 <https://doi.org/10.26083/tuprints-00017550>, [Master Thesis] https://doi.org/10.26083/tuprints-00017550 en info:eu-repo/semantics/masterThesis info:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
en |
format |
Dissertation |
sources |
NDLTD |
description |
Low-power wide-area networks (LPWAN) are becoming the wireless backbone for modern business processes and municipal administration. LoRaWAN, which stands for long-range wide-area network, is a recent medium access control (MAC) layer protocol competing for this market. It stands out by its open operator model and a novel modulation technique.
With LoRaWAN and other communication technologies are becoming a dependency for more and more aspects of today's society, the question for their security and reliability comes up. Previous researches on the topic have already revealed vulnerabilities in the first LoRaWAN specification, which have been partly mitigated in the most recent LoRaWAN 1.1. However, related studies often provide only theoretical results or consider practical scenarios only on a specific, small scale.
In this thesis, we present a LoRaWAN security evaluation framework that allows field-testing the security and reliability characteristics of actual LoRaWAN deployments. This provides not only reproducible results but also allows making a comparison between defined versions of the specification and LoRaWAN software. Before expounding implementation details, we provide a literature survey on LoRaWAN vulnerabilities and attacks to identify interesting aspects for further evaluation.
From our experimental results, we show that jamming is a serious threat to the availability of LoRaWAN networks. Furthermore, we demonstrate the practical applicability of two replay attacks against a selection of LoRaWAN software and illustrate why they will remain relevant for years due to backward compatibility. |
author |
Hessel, Frank |
spellingShingle |
Hessel, Frank LoRaWAN Security Analysis : An Experimental Evaluation of Attacks |
author_facet |
Hessel, Frank |
author_sort |
Hessel, Frank |
title |
LoRaWAN Security Analysis : An Experimental Evaluation of Attacks |
title_short |
LoRaWAN Security Analysis : An Experimental Evaluation of Attacks |
title_full |
LoRaWAN Security Analysis : An Experimental Evaluation of Attacks |
title_fullStr |
LoRaWAN Security Analysis : An Experimental Evaluation of Attacks |
title_full_unstemmed |
LoRaWAN Security Analysis : An Experimental Evaluation of Attacks |
title_sort |
lorawan security analysis : an experimental evaluation of attacks |
publishDate |
2021 |
url |
https://tuprints.ulb.tu-darmstadt.de/17550/1/LoRaWAN-Security-Analysis.pdf Hessel, Frank <http://tuprints.ulb.tu-darmstadt.de/view/person/Hessel=3AFrank=3A=3A.html> (2021): LoRaWAN Security Analysis : An Experimental Evaluation of Attacks. (Publisher's Version)Darmstadt, Technische Universität, DOI: 10.26083/tuprints-00017550 <https://doi.org/10.26083/tuprints-00017550>, [Master Thesis] |
work_keys_str_mv |
AT hesselfrank lorawansecurityanalysisanexperimentalevaluationofattacks |
_version_ |
1719376051905232896 |