|
|
|
|
LEADER |
02545nam a2200493Ia 4500 |
001 |
10.3390-s22093498 |
008 |
220706s2022 CNT 000 0 und d |
020 |
|
|
|a 14248220 (ISSN)
|
245 |
1 |
0 |
|a Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks
|
260 |
|
0 |
|b MDPI
|c 2022
|
856 |
|
|
|z View Fulltext in Publisher
|u https://doi.org/10.3390/s22093498
|
520 |
3 |
|
|a The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susceptible to a wide variety of malicious attacks, which can be notoriously difficult to mitigate since gateways are seen as obedient relays by design. These attacks, if not addressed, can cause malfunctions and loss of efficiency in the network traffic. As a solution to this unique problem, this paper presents a novel certificate authentication technique that enhances the cyber security of gateways in the LoRaWAN network. The proposed technique considers a public key infrastructure (PKI) solution that considers a two-tier certificate authority (CA) setup, such as a root-CA and intermediate-CA. This solution is promising, as the simulation results validate that about 66.67% of the packets that are arriving from an illegitimate gateway (GW) are discarded in our implemented secure and reliable solution. © 2022 by the authors. Licensee MDPI, Basel, Switzerland.
|
650 |
0 |
4 |
|a Attack
|
650 |
0 |
4 |
|a attacks
|
650 |
0 |
4 |
|a authentication
|
650 |
0 |
4 |
|a Authentication
|
650 |
0 |
4 |
|a Certificate authority
|
650 |
0 |
4 |
|a 'current
|
650 |
0 |
4 |
|a Cyber security
|
650 |
0 |
4 |
|a cybersecurity
|
650 |
0 |
4 |
|a Cybersecurity
|
650 |
0 |
4 |
|a gateway
|
650 |
0 |
4 |
|a Gateway
|
650 |
0 |
4 |
|a Gateways (computer networks)
|
650 |
0 |
4 |
|a Internet of things
|
650 |
0 |
4 |
|a Long range wide area network
|
650 |
0 |
4 |
|a LoRaWAN
|
650 |
0 |
4 |
|a Network security
|
650 |
0 |
4 |
|a Public key cryptography
|
650 |
0 |
4 |
|a security
|
650 |
0 |
4 |
|a Security
|
650 |
0 |
4 |
|a Security analysis
|
650 |
0 |
4 |
|a vulnerabilities
|
650 |
0 |
4 |
|a Vulnerability
|
650 |
0 |
4 |
|a Wide area networks
|
650 |
0 |
4 |
|a Wide-area networks
|
700 |
1 |
0 |
|a Butun, I.
|e author
|
700 |
1 |
0 |
|a Caviglia, D.D.
|e author
|
700 |
1 |
0 |
|a Gastaldo, P.
|e author
|
700 |
1 |
0 |
|a Lagerström, R.
|e author
|
700 |
1 |
0 |
|a Mohamed, A.
|e author
|
700 |
1 |
0 |
|a Qadir, J.
|e author
|
700 |
1 |
0 |
|a Wang, F.
|e author
|
773 |
|
|
|t Sensors
|