Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks

The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susc...

Full description

Bibliographic Details
Main Authors: Butun, I. (Author), Caviglia, D.D (Author), Gastaldo, P. (Author), Lagerström, R. (Author), Mohamed, A. (Author), Qadir, J. (Author), Wang, F. (Author)
Format: Article
Language:English
Published: MDPI 2022
Subjects:
Online Access:View Fulltext in Publisher
LEADER 02545nam a2200493Ia 4500
001 10.3390-s22093498
008 220706s2022 CNT 000 0 und d
020 |a 14248220 (ISSN) 
245 1 0 |a Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks 
260 0 |b MDPI  |c 2022 
856 |z View Fulltext in Publisher  |u https://doi.org/10.3390/s22093498 
520 3 |a The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susceptible to a wide variety of malicious attacks, which can be notoriously difficult to mitigate since gateways are seen as obedient relays by design. These attacks, if not addressed, can cause malfunctions and loss of efficiency in the network traffic. As a solution to this unique problem, this paper presents a novel certificate authentication technique that enhances the cyber security of gateways in the LoRaWAN network. The proposed technique considers a public key infrastructure (PKI) solution that considers a two-tier certificate authority (CA) setup, such as a root-CA and intermediate-CA. This solution is promising, as the simulation results validate that about 66.67% of the packets that are arriving from an illegitimate gateway (GW) are discarded in our implemented secure and reliable solution. © 2022 by the authors. Licensee MDPI, Basel, Switzerland. 
650 0 4 |a Attack 
650 0 4 |a attacks 
650 0 4 |a authentication 
650 0 4 |a Authentication 
650 0 4 |a Certificate authority 
650 0 4 |a 'current 
650 0 4 |a Cyber security 
650 0 4 |a cybersecurity 
650 0 4 |a Cybersecurity 
650 0 4 |a gateway 
650 0 4 |a Gateway 
650 0 4 |a Gateways (computer networks) 
650 0 4 |a Internet of things 
650 0 4 |a Long range wide area network 
650 0 4 |a LoRaWAN 
650 0 4 |a Network security 
650 0 4 |a Public key cryptography 
650 0 4 |a security 
650 0 4 |a Security 
650 0 4 |a Security analysis 
650 0 4 |a vulnerabilities 
650 0 4 |a Vulnerability 
650 0 4 |a Wide area networks 
650 0 4 |a Wide-area networks 
700 1 0 |a Butun, I.  |e author 
700 1 0 |a Caviglia, D.D.  |e author 
700 1 0 |a Gastaldo, P.  |e author 
700 1 0 |a Lagerström, R.  |e author 
700 1 0 |a Mohamed, A.  |e author 
700 1 0 |a Qadir, J.  |e author 
700 1 0 |a Wang, F.  |e author 
773 |t Sensors