| Literature DB >> 35591187 |
Ali Mohamed1, Franz Wang1, Ismail Butun1,2,3, Junaid Qadir3,4, Robert Lagerström3, Paolo Gastaldo4, Daniele D Caviglia4.
Abstract
The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the gateways in LoRaWAN in their current state are susceptible to a wide variety of malicious attacks, which can be notoriously difficult to mitigate since gateways are seen as obedient relays by design. These attacks, if not addressed, can cause malfunctions and loss of efficiency in the network traffic. As a solution to this unique problem, this paper presents a novel certificate authentication technique that enhances the cyber security of gateways in the LoRaWAN network. The proposed technique considers a public key infrastructure (PKI) solution that considers a two-tier certificate authority (CA) setup, such as a root-CA and intermediate-CA. This solution is promising, as the simulation results validate that about 66.67% of the packets that are arriving from an illegitimate gateway (GW) are discarded in our implemented secure and reliable solution.Entities:
Keywords: LoRaWAN; attacks; authentication; cybersecurity; gateway; security; vulnerabilities
Year: 2022 PMID: 35591187 PMCID: PMC9099514 DOI: 10.3390/s22093498
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Network architecture of LoRaWAN.
Figure 2Computing unit—Raspberry Pi4 Model B.
Figure 3LoRa radio chip—Adafruit RFM96W.
Figure 4Gateway hardware and wiring setup using RPi4 and RFM96W.
Figure 5Wire cable connections between the Raspberry Pi and LoRa radio chip.
Wire connection of the pins.
| Raspberry Pi 4 | RFM96W |
|---|---|
| 1 (3V3 Power) | VIN |
| 9 (Ground) | GND |
| 29 (GPIO 5) | G0 |
| 23 (GPIO 11: SCLK) | SCK |
| 21 (GPIO 9: MISO) | MISO |
| 19 (GPIO 10: MOSI) | MOSI |
| 26 (GPIO 7:CE1) | CS |
| 22 (GPIO 25) | RST |
Figure 6x.509v3 certificate format.
Figure 7Scenario of packet advancement under MITM attack.
Figure 8Flow chart of the certification process in the proposed work.
Signal strength levels of RSSI [25].
| Signal Strength | Rating | Info |
|---|---|---|
| >−30 dBm | Amazing | Max signal strength, due to being right next |
| to the client. Not reasonable in the real world. | ||
| −50 dBm | Excellent | Almost perfect signal strength in the real world |
| with ideal conditions. | ||
| −60 dBm | Very Good | High latency, would most likely not feel any |
| disturbance. | ||
| −70 dBm | Good | Minimum signal strength for reliable packet |
| delivery for menial tasks. | ||
| −80 dBm | Low | Minimum signal strength for basic connectivity. |
| Packet delivery is now unreliable. | ||
| −90 dBm | Very Low | Terrible signal strength, with frequent package |
| drops and connectivity issues. | ||
| <−100 dBm | No Signal | Not much if anything is able to get through. |
Figure 9The RSSI values of the baseline scenario, the first half being the RSSI of GW-A and the second half GW-B.
Figure 10(a) Water height values (indicated by triangles) gathered from end-device with no attack present, (b) water height values with a Selective Forwarding Attack present.
Figure 11Preliminary testing area with no line of sight. R-GW permanently placed at 200 m from the ED and L-GW placed at 200 m increments up to 800 m.
Figure 12Preliminary testing area with no line of sight. Data on packages received by the NS, total vs. accepted.
Literature comparison of related security solutions for LoRaWAN.
| Related Work | Authentication of End-Device with Server | Improvements on End-Device Comm | Improvements on Network Security | Authentication of GW with Server |
|---|---|---|---|---|
| Mårlind and Butun [ |
|
|
|
|
| Gresak and Voznak [ |
|
|
|
|
| Fan et al. [ |
|
|
|
|
| Ribeiro et al. [ |
|
|
|
|
| Danish et al. [ |
|
|
|
|
| Sanchez et al. [ |
|
|
|
|
| Naoui et al. [ |
|
|
|
|
|
|
|
|
|
|
Legend✖: Does not fulfill; ✔: Fulfills; ■: Inclusive.