A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol

Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specificati...

Full description

Saved in:
Bibliographic Details
Main Authors: Gao, Shu-Yang, Li, Xiao-Hong, Ma, Maode
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2020
Subjects:
Online Access:https://hdl.handle.net/10356/142217
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-142217
record_format dspace
spelling sg-ntu-dr.10356-1422172020-06-17T07:21:31Z A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol Gao, Shu-Yang Li, Xiao-Hong Ma, Maode School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Awareness Defense Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specification and the limited consumption performance of devices to carry out security attacks such as replay attacks. In the process of the over-the-air-activation (OTAA) for LoRa nodes, attackers can modify the data because the data is transmitted in plain text. If the user's root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network. To solve this security flaw in LoRaWAN, we propose a countermeasure called Secure-Packet-Transmission scheme (SPT) which works based on the LoRaWAN standard v1.1 to prevent replay attacks when an attacker has obtained the root key. The proposed scheme redefines the format of join-request packet, add the new One Time Password (OTP) encrypted method and changes the transmission strategy in OTAA between LoRa nodes and network server. The security evaluation by using the Burrows-Abadi-Needham logic (BAN Logic) and the Scyther shows that the security goal can be achieved. This paper also conducts extensive experiments by simulations and a testbed to perform feasibility and performance analysis. All results demonstrate that SPT is lightweight, efficient and able to defend against malicious behavior. Published version 2020-06-17T07:21:30Z 2020-06-17T07:21:30Z 2019 Journal Article Gao, S.-Y., Li, X.-H., & Ma, M. (2019). A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol. Sensors, 19(23), 5122-. doi:10.3390/s19235122 1424-8220 https://hdl.handle.net/10356/142217 10.3390/s19235122 31766778 2-s2.0-85075504034 23 19 en Sensors © 2019 The Authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
Awareness
Defense
spellingShingle Engineering::Electrical and electronic engineering
Awareness
Defense
Gao, Shu-Yang
Li, Xiao-Hong
Ma, Maode
A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol
description Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specification and the limited consumption performance of devices to carry out security attacks such as replay attacks. In the process of the over-the-air-activation (OTAA) for LoRa nodes, attackers can modify the data because the data is transmitted in plain text. If the user's root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network. To solve this security flaw in LoRaWAN, we propose a countermeasure called Secure-Packet-Transmission scheme (SPT) which works based on the LoRaWAN standard v1.1 to prevent replay attacks when an attacker has obtained the root key. The proposed scheme redefines the format of join-request packet, add the new One Time Password (OTP) encrypted method and changes the transmission strategy in OTAA between LoRa nodes and network server. The security evaluation by using the Burrows-Abadi-Needham logic (BAN Logic) and the Scyther shows that the security goal can be achieved. This paper also conducts extensive experiments by simulations and a testbed to perform feasibility and performance analysis. All results demonstrate that SPT is lightweight, efficient and able to defend against malicious behavior.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Gao, Shu-Yang
Li, Xiao-Hong
Ma, Maode
format Article
author Gao, Shu-Yang
Li, Xiao-Hong
Ma, Maode
author_sort Gao, Shu-Yang
title A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol
title_short A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol
title_full A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol
title_fullStr A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol
title_full_unstemmed A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol
title_sort malicious behavior awareness and defense countermeasure based on lorawan protocol
publishDate 2020
url https://hdl.handle.net/10356/142217
_version_ 1681058915244048384