| Literature DB >> 35590817 |
Henri Ruotsalainen1, Guanxiong Shen2, Junqing Zhang2, Radek Fujdiak3.
Abstract
As LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security. In particular, physical layer topics become relevant to improve the security of LoRaWAN nodes, which are often limited in terms of computational power and communication resources. To this end, e.g., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access. Further, wireless physical layer techniques have potential to enhance key refreshment and device authentication. In this work, we aim to provide a comprehensive review of various vulnerabilities, countermeasures and security enhancing features concerning the LoRaWAN physical layer. Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions.Entities:
Keywords: LoRaWAN; hardware security; physical layer; security; vulnerabilities
Mesh:
Year: 2022 PMID: 35590817 PMCID: PMC9100101 DOI: 10.3390/s22093127
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Treatment of physical layer security topics in LoRaWAN security review papers.
| Reference | Year | Physical Layer Attacks | Physical Layer Countermeasures |
|---|---|---|---|
| [ | 2020 | moderate | moderate |
| [ | 2021 | moderate | moderate |
| [ | 2020 | superficial | - |
| [ | 2019 | moderate | moderate |
| [ | 2020 | moderate | superficial |
| [ | 2021 | - | - |
|
| 2022 |
|
|
Figure 1Overview of the LoRaWAN network architecture.
Figure 2LoRaWAN reception windows in Class-A operation mode.
Figure 3(a) I−branch of the LoRa signal. (b) Spectrogram of the LoRa signal.
Figure 4Overview of the LoRaWAN packet structure.
Overview of reviewed physical-layer vulnerabilities.
| Reference | Attack Category | Affects * | Technology | Experimental Results |
|---|---|---|---|---|
| [ | Sniffers | C | LoRaWAN 1.0x | yes |
| [ | Sniffers | C | LoRaWAN 1.0x | no |
| [ | Sniffers | C | LoRaWAN 1.0x | yes |
| [ | Sniffers | C | LoRaWAN 1.0x | yes |
| [ | Covert Channels | C,I | LoRaWAN 1.0x | yes |
| [ | Jamming | A | LoRaWAN 1.0x | yes |
| [ | Jamming | A | LoRaWAN 1.0x | no |
| [ | Jamming | A | LoRaWAN 1.0x | yes |
| [ | Jamming | A | LoRaWAN 1.1/1.0x | yes |
| [ | Jamming | A | LoRaWAN 1.0x | no |
| [ | Jamming | A | LoRaWAN 1.0x | yes |
| [ | Key Extraction | C,I | LoRaWAN 1.0x | yes |
| [ | Key Extraction | C,I | LoRaWAN 1.03 | yes |
| [ | Key Extraction | C,I | LoRaWAN 1.0x | no |
| [ | Worm-Hole | A | LoRaWAN 1.0x | yes |
| [ | Worm-Hole | A | LoRaWAN 1.1/1.0x | yes |
| [ | Energy attack | A | LoRaWAN 1.1/1.0x | yes |
* (C—Confidentiality, I—Integrity, A—Availability).
Figure 5A software-defined multichannel LoRaWAN receiver in GNU Radio.
Figure 6Bidirectional wormhole attack in LoRaWAN.
Overview of physical layer countermeasures.
| Ref. | Technique | Enhances * | Advantages | Disadvantages |
|---|---|---|---|---|
| [ | Replay detection | C | Comprehensive experimental validation | - |
| [ | Secret key agreement | C,I | Experimental validation | No experiments with LoRaWAN |
| [ | Secret key agreement | C,I | Quantization for high key randomness | No experiments with LoRaWAN |
| [ | Secret key agreement | C,I | Effective over long communication distances | Requires reconfigurable antennas |
| [ | Secret key agreement | C,I | Suitable for mobile and stationary nodes | - |
| [ | Secret key agreement | C,I | Low algorithmic complexity | Bit disagreement rate |
| [ | Secret key agreement | C,I | High secret key entropy | Increased algorithmic complexity |
| [ | Jamming detection | A | Versatile modeling tools for performance evaluation | No large scale validation |
| [ | Jamming detection | A | High detection accuracy | Only small scale validation |
| [ | Jamming resilience | A | - | No experimental validation |
| [ | Jamming resilience | A | - | No experimental validation |
| [ | Jamming resilience | A | Effective against synchronized jammers | - |
| [ | Jamming resilience | A | High performance improvement with low overhead | Acknowledged transmissions not supported |
| [ | Jamming resilience | A | High performance improvement | - |
| [ | Wireless fingerprinting | U | Investigation on various neural networks | Channel effect is not considered |
| [ | Wireless fingerprinting | U | Algorithm for manual extraction of RF fingerprints | Experiments on channel robustness are missing |
| [ | Wireless fingerprinting | U | Both indoor and outdoor experiments. Receiver and channel effects are studied. | Solutions to channel and receiver effects are not provided |
| [ | Wireless fingerprinting | U | Experiments at various distances are conducted | Solutions to channel effects are not provided |
| [ | Wireless fingerprinting | U | Consideration on openset/zero-shot classification | Solutions to channel effects are not provided |
| [ | Wireless fingerprinting | U | Large-scale dataset of 100 LoRa devices. Both outdoor and indoor environments | - |
| [ | Wireless fingerprinting | U | Design of channel independent spectrogram to mitigate channel effects. | Low SNR outdoor experiments are missing |
* (C—Confidentiality, I—Integrity, A—Availability, U—Authentication).
Figure 7Secret-key-generation in a LoRaWAN network.
Figure 8Block diagram of secret-key-generation for LoRaWAN, including necessary communication between a node and a gateway.
Figure 9Overview of an RFFI system.
Figure 10Classification result on LoRaWAN Radio frequency fingerprint identification with the overall accuracy of 97.75%.