| Literature DB >> 31766778 |
Shu-Yang Gao1,2, Xiao-Hong Li1,2, Mao-De Ma3.
Abstract
Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specification and the limited consumption performance of devices to carry out security attacks such as replay attacks. In the process of the over-the-air-activation (OTAA) for LoRa nodes, attackers can modify the data because the data is transmitted in plain text. If the user's root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network. To solve this security flaw in LoRaWAN, we propose a countermeasure called Secure-Packet-Transmission scheme (SPT) which works based on the LoRaWAN standard v1.1 to prevent replay attacks when an attacker has obtained the root key. The proposed scheme redefines the format of join-request packet, add the new One Time Password (OTP) encrypted method and changes the transmission strategy in OTAA between LoRa nodes and network server. The security evaluation by using the Burrows-Abadi-Needham logic (BAN Logic) and the Scyther shows that the security goal can be achieved. This paper also conducts extensive experiments by simulations and a testbed to perform feasibility and performance analysis. All results demonstrate that SPT is lightweight, efficient and able to defend against malicious behavior.Entities:
Keywords: LoRaWAN; awareness; defense; replay attack
Year: 2019 PMID: 31766778 PMCID: PMC6928866 DOI: 10.3390/s19235122
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Join-Request data Structure.
Abbreviation.
| Notations | Description |
|---|---|
|
| End Device same as node |
|
| Gate Way between Node and Network Server |
|
| NetWork Server |
|
| Join request |
|
| New Join request |
|
| encode some message |
|
| signal-to-noise ratio |
|
| aes128-encryption method |
Figure 2Over-the-air-activation (OTAA) Process Model.
Figure 3The Secure-Packet-Transmission (SPT) System.
Figure 4Packet Join-requests.
Figure 5The sequence chart of SPT.
Figure 6Comparison between Replay attack detection process.
Figure 7Scyther results characterize the low power wide area network (LoRaWAN).
Figure 8Scyther results characterize the LoRaWAN.
LoRaWAN V1.1 and SPT Scyther validation results.
| Protocol | LoRaWAN v1.1 | LoRaWAN+SPT | ||
|---|---|---|---|---|
|
|
|
|
|
|
| Role:Node | ||||
| Alive | Ok | No attack | Ok | No attack |
| Weakagree | Ok | No attack | Ok | No attack |
| Niagree | Ok | No attack | Ok | No attack |
| Nisynch | Fail |
| Ok | No attack |
| SKRAPPSKey | Ok | No attack | Ok | No attack |
| SKRNwkSKey | Ok | No attack | Ok | No attack |
| SKRSnwkSIntKey | Ok | No attack | Ok | No attack |
| SKRNwkSencKey | Ok | No attack | Ok | No attack |
| SKRJSEncKey | Ok | No attack | Ok | No attack |
| SKRJSIntKey | Ok | No attack | Ok | No attack |
| Role:Server | ||||
| Alive | Ok | No attack | Ok | No attack |
| Weakagree | Ok | No attack | Ok | No attack |
| SKRAPPSKey | Ok | No attack | Ok | No attack |
| SKRNwkSKey | Ok | No attack | Ok | No attack |
| SKRSnwkSIntKey | Ok | No attack | Ok | No attack |
| SKRNwkSencKey | Ok | No attack | Ok | No attack |
| SKRJSEncKey | Ok | No attack | Ok | No attack |
| SKRJSIntKey | Ok | No attack | Ok | No attack |
The simulation parameters.
| Parameter | Value |
|---|---|
| Carrier Frequency | 433 MHz |
| Bandwidth | 125 kHz |
| Code Rate | 3/4 |
| Spreading Factor | 7 to 12 |
| Transmission Power | 2 dBm to 14 dBm |
Standard deviation of the path loss.
| Scenario | Ideal | Moderate Variability | Typical Variability |
|---|---|---|---|
| Urbany | 0 | 1.78 | 3.55 |
| Sub-urban | 0 | 3.56 | 7.2 |
Delivery Ratio in ideal simulation environment for over-the-air-activation (OTAA) and SPT.
| Node | OTAA-u | OTAA-su | SPT-u | SPT-su |
|---|---|---|---|---|
| 100 | 99 | 85 |
|
|
| 200 | 95 | 82 |
|
|
| 300 | 92 | 87 |
|
|
| 400 | 93 | 83 |
|
|
| 500 | 98 | 84 |
|
|
| 600 | 92 | 82 |
|
|
| 700 | 90 | 81 |
|
|
Delivery Ratio in moderate variability and Typical variability in Omnet for OTAA and SPT.
| Nodes | Moderate Variability | Typical Variability | ||||||
|---|---|---|---|---|---|---|---|---|
| OTAA | OTAA | SPT | SPT | OTAA | OTAA | SPT | SPT | |
| 100 | 65 | 22 |
|
| 23 | 16 |
|
|
| 200 | 66 | 23 |
|
| 22 | 17 |
|
|
| 300 | 63 | 23 |
|
| 24 | 17 |
|
|
| 400 | 62 | 24 |
|
| 25 | 16 |
|
|
| 500 | 64 | 26 |
|
| 21 | 18 |
|
|
| 600 | 65 | 22 |
|
| 20 | 17 |
|
|
| 700 | 61 | 23 |
|
| 20 | 16 |
|
|
Delivery Ratio in Test Bed for OTAA and SPT in different distances.
| Node | OTAA-Short | OTAA-Long | SPT-Short | SPT-Long |
|---|---|---|---|---|
|
| 98 | 82 |
|
|
|
| 95 | 84 |
|
|
|
| 92 | 85 |
|
|
|
| 95 | 86 |
|
|
|
| 96 | 86 |
|
|
Figure 9OTAA with SPT UI and Real TestBed.
Figure 10Energy consumption and Battery Life in different distance.
Configuration for each attack model.
| MHDR | Unique Part | DevNonce | MIC | Temperature | Distance | |
|---|---|---|---|---|---|---|
|
| No | No | Yes | No | 22 | 0.1 km/2 km |
|
| Yes | No | Yes | Yes | 20 | 0.1 km/2 km |
|
| Yes | No | Yes | Yes | 20 | 0.1 km/2 km |
Figure 11Temperature data under each attack