skip to main content
survey

LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation

Authors:
Frank Hessel
Technical University of Darmstadt, Darmstadt, Germany
,
Lars Almon
Technical University of Darmstadt, Darmstadt, Germany
,
Matthias Hollick
Technical University of Darmstadt, Darmstadt, Germany
Authors Info & Claims
Published: 07 March 2023 Publication History

Abstract

The changing vulnerability and threat landscape constantly challenge the security of wireless communication standards and protocols. For the Internet of Things (IoT), LoRaWAN is one of the dominant technologies for urban environments, industrial settings, or critical infrastructures due to its low-power and long-range capabilities. LoRaWAN IoT deployments are expected to operate for multiple years or even decades. Hence, it is imperative to maintain operational security at all times while continuously evolving the security of the standard and its implementations. We survey LoRaWAN security and follow a systematic and evolvable approach that can be dynamically updated. To this end, we propose a novel methodology to create evolvable surveys which relate the analyzed critical security concepts, thus allowing IT security experts to reason about LoRaWAN security properties over time. With this, we provide a tool to hardware manufacturers, software developers and providers, and network operators to achieve sustainable security for IoT deployments.

References

[1]
Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, and Thomas Watteyne. 2017. Understanding the limits of LoRaWAN. IEEE Communications Magazine 55, 9 (92017), 34–40. DOI:
[2]
Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. 2017. Exploring the security vulnerabilities of LoRa. In Proceedings of the 2017 3rd IEEE International Conference on Cybernetics (CYBCONF). IEEE, 1–6.
[3]
Emekcan Aras, Nicolas Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, and Danny Hughes. 2017. Selective jamming of LoRaWAN using commodity hardware. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous’17). Association for Computing Machinery, 363–372. DOI:
[4]
Gildas Avoine and Loic Ferreira. 2018. Rescuing LoRaWAN 1.0. In Proceedings of the 22nd International Conference On Financial Cryptography and Data Security 2018. Springer, Berlin, 253–271. DOI:
[5]
Suman Bala, Dominique Barthel, and Säid Gharout. 2019. Separate session key generation approach for network and application flows in LoRaWAN. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC’19). Association for Computing Machinery, New York, NY, 870–879. DOI:
[6]
Elaine Barker. 2020. Recommendation for Key Management, Part 1: General, Special Publication (NIST SP). National Institute of Standards and Technology, Gaithersburg, MD. DOI:
[7]
Pamela Beltrán-García, Ponciano Jorge Escamilla-Ambrosio, Eleazar Aguirre-Anaya, and Abraham Rodríguez-Mota. 2020. Availability vulnerabilities evaluation to LoRaWAN. In Proceedings of the Telematics and Computing (Communications in Computer and Information Science), Miguel Félix Mata-Rivera, Roberto Zagal-Flores, and Cristian Barria-Huidobro (Eds.). Springer International Publishing, Cham, 333–351. DOI:
[8]
Thomas Bigler, Albert Treytl, and Thilo Sauter. 2020. Side-channel watermarking for LoRaWAN using robust inter-packet timing. In Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vol. 1. 1367–1370. DOI:
[9]
Alex Biryukov, Adi Shamir, and David Wagner. 2001. Real time cryptanalysis of A5/1 on a PC. In Proceedings of the Fast Software Encryption, Gerhard Goos, Juris Hartmanis, Jan van Leeuwen, and Bruce Schneier (Eds.). Springer, Berlin, 1–18.
[10]
Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2018. Analysis of LoRaWAN v1.1 security: Research paper. In Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects (SMARTOBJECTS’18). ACM, Association for Computing Machinery, 1–6.
[11]
Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2018. Security risk analysis of LoRaWAN and future directions. Future Internet 11, 1 (Dec.2018), 3. DOI:
[12]
Sébastien Canard and Loïc Ferreira. 2019. Extended 3-party ACCE and application to LoRaWAN 1.1. In Proceedings of the Progress in Cryptology—AFRICACRYPT 2019, Johannes Buchmann, Abderrahmane Nitaj, and Tajjeeddine Rachidi (Eds.). Springer International Publishing, Cham, 21–38. DOI:
[13]
Cesar Cerrudo, Esteban Martinez Fayo, and Matias Sequeira. 2020. LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems, How to Detect and Prevent Them. Technical Report.
[14]
Ning Chen, Aiqun Hu, and Hua Fu. 2021. LoRa radio frequency fingerprint identification based on frequency offset characteristics and optimized LoRaWAN access technology. In Proceedings of the 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Vol. 5. 1801–1807. DOI:
[15]
Florian Laurentiu Coman, Krzysztof Mateusz Malarski, Martin Nordal Petersen, and Sarah Ruepp. 2019. Security issues in internet of things: Vulnerability analysis of LoRaWAN, sigfox and NB-IoT. In Proceedings of the 2019 Global IoT Summit (GIoTS). 1–6. DOI:
[16]
Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Luigi Romano, Irene Bonetti, and Elena Spagnuolo. 2021. The protection of LP-WAN Endpoints via TEE: A chemical storage case study. In Proceedings of the 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 345–352. DOI:
[17]
Semtech Corporation. 2016. LoRaWAN—Simple Rate Adaptation Recommended Algorithm. Technical Report.
[18]
Cas J. F. Cremers. 2008. The scyther tool: Verification, falsification, and analysis of security protocols. In Proceedings of the Computer Aided Verification, Aarti Gupta and Sharad Malik (Eds.). Springer, Berlin, 414–418.
[19]
Daniele Croce, Michele Gucciardo, Stefano Mangione, Giuseppe Santaromita, and Ilenia Tinnirello. 2018. Impact of LoRa imperfect orthogonality: Analysis of link-level performance. IEEE Communications Letters 22, 4 (2018), 796–799. DOI:
[20]
Syed Muhammad Danish, Arfa Nasir, Hassaan Khaliq Qureshi, Ayesha Binte Ashfaq, Shahid Mumtaz, and Jonathan Rodriguez. 2018. Network intrusion detection system for jamming attack in LoRaWAN join procedure. In Proceedings of the 2018 IEEE International Conference on Communications (ICC). 1–6. DOI:
[21]
Poliana De Moraes and Arlindo Flavio Da Conceição. 2021. Protecting LoRaWan data against untrusted network servers. In Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing Communications (GreenCom) and IEEE Cyber, Physical Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics). 99–106. DOI:
[22]
Joris Delclef. 2018. Change Request: FOpts Encrpytion, Usage of FCntDown on the LoRaWAN L2 1.1 Specification. Technical Report. STMicroelectronics. Retrieved from https://lora-alliance.org/resource-hub/fopts-encryption-usage-fcntdwn-errata-lorawan-l2-11-specification.
[23]
Tahsin C. M. Dönmez and Ethiopia Nigussie. 2018. Security of join procedure and its delegation in LoRaWAN v1.1. Procedia Computer Science 134 (2018), 204–211. DOI:
[24]
Tahsin C. M. Dönmez and Ethiopia Nigussie. 2018. Security of LoRaWAN v1.1 in backward compatibility scenarios. Procedia Computer Science 134 (2018), 51–58. DOI:The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018)/The 13th International Conference on Future Networks and Communications (FNC-2018)/Affiliated Workshops.
[25]
Tahsin C.M. Dönmez and Ethiopia Nigussie. 2019. Key management through delegation for LoRaWAN based healthcare monitoring systems. In Proceedings of the 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT). 1–6. DOI:
[26]
Mohamed Eldefrawy, Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2019. Formal security analysis of LoRaWAN. Computer Networks 148 (2019), 328–339. DOI:
[27]
Bernat Carbonés Fargas and Martin Nordal Petersen. 2017. GPS-free geolocation using LoRa in low-power WANs. In Proceedings of the 2017 Global Internet of Things Summit (Giots). IEEE, 1–6. DOI:
[28]
Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, and Sylvain Guilley. 2020. Evaluation of side-channel key-recovery attacks on LoRaWAN end-device. In Proceedings of the Information Systems Security and Privacy, Paolo Mori, Steven Furnell, and Olivier Camp (Eds.). Springer International Publishing, Cham, 74–92. DOI:
[29]
FUOTA Working Group of the LoRa Alliance Technical Committee. 2019. FUOTA Process Summary—Technical Recommendation TR002 v1.0.0. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/fuota-process-summary-technical-recommendation-tr002-v100.
[30]
Alexander Gladisch, Simon Rietschel, Thomas Mundt, Johann Bauer, Johannes Goltz, and Simeon Wiedenmann. 2018. Securely connecting iot devices with LoRaWAN. In Proceedings of the 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4). 220–229. DOI:
[31]
Ana Goulart, Anitha Chennamaneni, Damiano Torre, Byul Hur, and Fadhil Y. Al-Aboosi. 2022. On wide-area IoT networks, lightweight security and their applications—a practical review. Electronics 11, 11 (Jan.2022), 1762. DOI:
[32]
Claire Goursaud and Jean-Marie Gorce. 2015. Dedicated networks for IoT: PHY/MAC state of the art and challenges. EAI Endorsed Transactions on Internet of Things 1, 1 (Oct.2015), 1–11. DOI:
[33]
Jialuo Han and Jidong Wang. 2018. An enhanced key management scheme for LoRaWAN. Cryptography 2, 4 (Nov2018), 34. DOI:
[34]
Jetmir Haxhibeqiri, Eli De Poorter, Ingrid Moerman, and Jeroen Hoebeke. 2018. A survey of LoRaWan for IoT: From technology to application. Sensors 18, 11 (2018), 3995. DOI:
[35]
Jetmir Haxhibeqiri, Floris Van den Abeele, Ingrid Moerman, and Jeroen Hoebeke. 2017. LoRa scalability: A simulation model based on interference measurements. Sensors 17, 6 (June2017), 1193. DOI:
[36]
Nur Hayati, Kalamullah Ramli, Susila Windarta, and Muhammad Suryanegara. 2022. A novel secure root key updating scheme for LoRaWANs based on CTR_AES DRBG 128. IEEE Access 10 (2022), 18807–18819. DOI:
[37]
Frank Hessel, Lars Almon, and Flor Álvarez. 2020. ChirpOTLE: A framework for practical LoRaWAN security evaluation. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, New York, NY, 306–316. DOI:
[38]
Frank Philipp Hessel. 2019. LoRaWAN Security Analysis: An Experimental Evaluation of Attacks. Master’s thesis. Technische Universität Darmstadt.
[39]
Ningning Hou and Yuanqinq Zheng. 2020. CloakLoRa: A covert channel over LoRa PHY. In Proceedings of the 2020 IEEE 28th International Conference on Network Protocols (ICNP). 1–11. DOI:
[40]
Max Ingham, Jims Marchang, and Deepayan Bhowmik. 2020. IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN. IET Information Security 14, 4 (2020), 368–379. DOI:
[41]
Martha N. Kamkuemah. 2021. Epistemic analysis of a key-management vulnerability in LoRaWAN. In Proceedings of the 2021 18th International Conference on Privacy, Security and Trust (PST). 1–7. DOI:
[42]
Jaehyu Kim and JooSeok Song. 2017. A simple and efficient replay attack prevention scheme for LoRaWAN. In Proceedings of the 2017 the 7th International Conference on Communication and Network Security. ACM, 32–36. DOI:
[43]
Reinhard Kloibhofer, Erwin Kristen, and Luca Davoli. 2020. LoRaWAN with HSM as a security improvement for agriculture applications. In Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops (Lecture Notes in Computer Science), António Casimiro, Frank Ortmeier, Erwin Schoitsch, Friedemann Bitsch, and Pedro Ferreira (Eds.). Springer International Publishing, Cham, 176–188. DOI:
[44]
Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, and Christian Reuter. 2022. LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios. Transactions on Emerging Telecommunications Technologies 33, 5 (2022). DOI:
[45]
JungWoon Lee, DongYeop Hwang, JiHong Park, and Ki-Hyung Kim. 2017. Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. In Proceedings of the 2017 International Conference on Information Networking (ICOIN). IEEE, 549–551. DOI:
[46]
Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, and Srdjan Čapkun. 2018. I send, therefore i leak: Information leakage in low-power wide area networks. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (Stockholm, Sweden) (WiSec’18). Association for Computing Machinery, New York, NY, 23–33. DOI:
[47]
Pierluigi Locatelli, Pietro Spadaccino, and Francesca Cuomo. 2021. Hijacking downlink path selection in LoRaWAN. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM). 1–6. DOI:
[48]
LoRa Alliance Technical Committee. 2017. LoRaWAN™ Backend Interfaces 1.0 Specification. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-back-end-interfaces-v10.
[49]
LoRa Alliance Technical Committee. 2017. LoRaWAN™ Specification v1.1. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v11.
[50]
LoRa Alliance Technical Committee. 2018. LoRaWAN™ Specification V1.0.3. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v103.
[51]
LoRa Alliance Technical Committee. 2018. Technical Recommendations for Preventing State Synchronization Issues around LoRaWAN™ 1.0.x Join Procedure. Technical Report. LoRa Alliance.
[52]
LoRa Alliance Technical Committee. 2020. LoRaWAN ® L2 1.0.4 Specification (TS001-1.0.4). Technical Report. LoRa Alliance.
[53]
LoRa Alliance Technical Committee. 2020. LoRaWAN® Backend Interfaces Technical Specification (TS002-1.1.0). Technical Report. Semtech Corporation. 85 pages.
[54]
LoRa Alliance Technical Committee Regional Parameters Workgroup. 2020. RP002-1.0.1 LoRaWAN® Regional Parameters. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/rp2-101-lorawanr-regional-parameters.
[55]
Slim Loukil, Lamia Chaari Fourati, Anand Nayyar, and K.-W.-A. Chee. 2022. Analysis of LoRaWAN 1.0 and 1.1 protocols security mechanisms. Sensors 22, 10 (Jan.2022), 3717. DOI:
[56]
Frederik Mårlind and Ismail Butun. 2020. Activation of LoRaWAN end devices by using public key cryptography. In Proceedings of the 2020 4th Cyber Security in Networking Conference (CSNet). 1–8. DOI:
[57]
Ivan Martinez, Philippe Tanguy, and Fabienne Nouvel. 2019. On the performance evaluation of LoRaWAN under jamming. In Proceedings of the 2019 12th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE. DOI:
[58]
Ross McPherson and James Irvine. 2020. Secure decentralised deployment of LoRaWAN sensors. IEEE Sensors Journal 21, 1 (2020), 1–1. DOI:
[59]
Kais Mekki, Eddy Bajic, Frederic Chaxel, and Fernand Meyer. 2019. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 5, 1 (2019), 1–7.
[60]
Konstantin Mikhaylov, Radek Fujdiak, Ari Pouttu, Voznak Miroslav, Lukas Malina, and Petr Mlynek. 2019. Energy attack in LoRaWAN: Experimental validation. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES’19). ACM, New York, NY, Article 74, 6 pages. DOI:
[61]
Stefano Milani and Ioannis Chatzigiannakis. 2021. Design, analysis, and experimental evaluation of a new secure rejoin mechanism for LoRaWAN using elliptic-curve cryptography. Journal of Sensor and Actuator Networks 10, 2 (June2021), 36. DOI:
[62]
Robert Miller. 2016. Lora security: Building a secure LoRa solution. MWR Labs Whitepaper (2016).
[63]
Mohammad Mezanur Rahman Monjur, Joseph Heacock, Rui Sun, and Qiaoyan Yu. 2021. An attack analysis framework for LoRaWAN applied advanced manufacturing. In Proceedings of the 2021 IEEE International Symposium on Technologies for Homeland Security (HST). 1–7. DOI:
[64]
SeungJae Na, DongYeop Hwang, WoonSeob Shin, and Ki-Hyung Kim. 2017. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In Proceedings of the 2017 International Conference on Information Networking (ICOIN). IEEE, 718–720. DOI:
[65]
Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, and Bong Jun Choi. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS’20). Association for Computing Machinery, New York, NY, 2117–2119. DOI:
[66]
Sarra Naoui, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. 2020. Novel enhanced LoRaWAN framework for smart home remote control security. Wireless Personal Communications 110, 4 (Feb.2020), 2109–2130. DOI:
[67]
Sarra Naoui, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. 2017. Trusted third party based key management for enhancing LoRaWAN security. In Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). 1306–1313. DOI:
[68]
Jorge Navarro-Ortiz, Natalia Chinchilla-Romero, Juan J. Ramos-Munoz, and Pablo Munoz-Luengo. 2019. Improving hardware security for LoRaWAN. In Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN). 1–6. DOI:
[69]
Hassan Noura, Tarif Hatoum, Ola Salman, Jean-Paul Yaacoub, and Ali Chehab. 2020. LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet of Things 12 (Dec.2020), 100303. DOI:
[70]
Bogdan Oniga, Vasile Dadarlat, Eli De Poorter, and Adrian Munteanu. 2017. Analysis, design and implementation of secure LoRaWAN sensor networks. In Proceedings of the 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 421–428. DOI:
[71]
Toni Perković and Dino Siriščević. 2020. Low-cost LoRaWAN jammer. In Proceedings of the 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech). 1–6. DOI:
[72]
Sumesh J. Philip, James M. McQuillan, and Oluwatoba Adegbite. 2020. LoRaWAN v1.1 Security: Are we in the clear yet? In Proceedings of the 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys). 112–118. DOI:
[73]
Ondrej Pospisil, Radek Fujdiak, Konstantin Mikhaylov, Henri Ruotsalainen, and Jiri Misurec. 2021. Testbed for LoRaWAN Security: Design and validation through man-in-the-middle attacks study. Applied Sciences 11, 16 (Jan.2021), 7642. DOI:
[74]
Andri Rahmadhani and Fernando Kuipers. 2018. When LoRaWAN frames collide. In Proceedings of the 12th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (ACM WiNTECH’18). DOI:
[75]
Brecht Reynders, Wannes Meert, and Sofie Pollin. 2016. Range and coexistence analysis of long range unlicensed communication. In Proceedings of the 2016 23rd International Conference on Telecommunications (ICT). IEEE, 1–6. DOI:
[76]
Victor Ribeiro, Raimir Holanda, Alex Ramos, and Joel J. P. C. Rodrigues. 2020. Enhancing key management in LoRaWAN with permissioned blockchain. Sensors 20, 11 (May2020), 3068. DOI:
[77]
Alessandra Rizzardi, Sabrina Sicari, and Alberto Coen-Porisini. 2022. Analysis on functionalities and security features of internet of things related protocols. Wireless Networks 28, 7 (2022), 2857–2887. DOI:
[78]
Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, and Bart Preneel. 2017. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’17). Association for Computing Machinery, New York, NY, 58–63. DOI:
[79]
Jan Ruge, Jiska Classen, Francesco Gringoli, and Matthias Hollick. 2020. Frankenstein: Advanced wireless fuzzing to exploit new bluetooth escalation targets. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 19–36.
[80]
Ramon Sanchez-Iborra, Jesús Sánchez-Gómez, Salvador Pérez, Pedro Fernández, José Santa, José Hernández-Ramos, and Antonio Skarmeta. 2018. Enhancing LoRaWAN security through a lightweight and authenticated key management approach. Sensors 18, 6 (2018), 1833. DOI:
[81]
Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, and Jean-Pierre Seifert. 2016. Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In Proceedings of the 2016 Network and Distributed System Security Symposium. Internet Society. DOI:
[82]
Vladislav Skorpil, Vaclav Oujezsky, and Ludek Palenik. 2018. Internet of things security overview and practical demonstration. In Proceedings of the 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 1–7. DOI:
[83]
Nicolas Sornin, Miguel Luis, Thomas Eirich, Thorsten Kramp, and Olivier Hersent. 2015. LoRaWAN™ Specification v1.0. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v10.
[84]
Nicolas Sornin, Miguel Luis, Thomas Eirich, Thorsten Kramp, and Olivier Hersent. 2016. LoRaWAN™ Specification v1.0.1. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v101.
[85]
Nicolas Sornin, Miguel Luis, Thomas Eirich, Thorsten Kramp, and Olivier Hersent. 2016. LoRaWAN™ Specification v1.0.2. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v102.
[86]
Pietro Spadaccino, Domenico Garlisi, Francesca Cuomo, Giorgio Pillon, and Patrizio Pisani. 2022. Discovery privacy threats via device de-anonymization in LoRaWAN. Computer Communications 189 (May2022), 1–10. DOI:
[87]
Woo-Jin Sung, Hyeong-Geun Ahn, Jong-Beom Kim, and Seong-Gon Choi. 2018. Protecting end-device from replay attack on LoRaWAN. In Proceedings of the 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE, 167–171. DOI:
[88]
Stefano Tomasin, Simone Zulian, and Lorenzo Vangelista. 2017. Security analysis of LoRaWAN join procedure for internet of things networks. In Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 1–6. DOI:
[89]
Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, and Chuan-Tian Wu. 2022. Secure LoRaWAN root key update scheme for IoT environment. In Proceedings of the Mobile Internet Security (Communications in Computer and Information Science). Ilsun You, Hwankuk Kim, Taek-Young Youn, Francesco Palmieri, and Igor Kotenko (Eds.). Springer Nature, 3–15. DOI:
[90]
Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, and Huei-Tang Luo. 2020. A LoRaWAN based energy efficient data encryption method. In Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, Leonard Barolli, Fatos Xhafa, and Omar K. Hussain (Eds.). Springer International Publishing, Cham, 493–502. DOI:
[91]
Floris Van den Abeele, Jetmir Haxhibeqiri, Ingrid Moerman, and Jeroen Hoebeke. 2017. Scalability analysis of large-scale lorawan networks in NS-3. IEEE Internet of Things Journal 4, 6 (Dec.2017), 2186–2198. DOI:
[92]
Eef van Es. 2018. LoRaWAN Vulerability Analysis – (In)validation of Possible Vulnerabilities in the LoRaWAN Protocol Specification. Master’s thesis. Open University of the Netherlands.
[93]
Eef van Es, Harald Vranken, and Arjen Hommersom. 2018. Denial-of-service attacks on LoRaWAN. In Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 17. DOI:
[94]
Mathy Vanhoef and Frank Piessens. 2017. Key reinstallation attacks: Forcing nonce reuse in WPA2. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, 1313–1328. DOI:
[95]
Prachi V. Wadatkar, Bharat S. Chaudhari, and Marco Zennaro. 2019. Impact of interference on LoRaWAN link performance. In Proceedings of the 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA). 1–5. DOI:
[96]
Stephan Wesemeyer, Ioana Boureanu, Zach Smith, and Helen Treharne. 2020. Extensive security verification of the LoRaWAN key-establishment: Insecurities patches. In Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroSP). 425–444. DOI:
[97]
Jiming Xu, You Tang, Yujian Wang, and Xinán Wang. 2019. A practical side-channel attack of a LoRaWAN module using deep learning. In Proceedings of the 2019 IEEE 13th International Conference on Anti-Counterfeiting, Security, and Identification (ASID). 17–21. DOI:
[98]
Xueying Yang. 2017. LoRaWAN: Vulnerability Analysis and Practical Exploitation. Master’s thesis. Delft University of Technology.
[99]
Xueying Yang, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. 2018. Security vulnerabilities in LoRaWAN. In Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 129–140. DOI:
[100]
Ilsun You, Soonhyun Kwon, Gaurav Choudhary, Vishal Sharma, and Jung Seo. 2018. An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18, 6 (Jun2018), 1888. DOI:
[101]
Simone Zulian. 2016. Security Threat Analysis and Countermeasures for LoRaWAN Join Procedure. Master’s thesis. Universitá degli Studi di Padova.

Cited By

View all
  • (2024)Energy-Adaptive and Robust Monitoring for Smart Farms Based on Solar-Powered Wireless SensorsIEEE Internet of Things Journal10.1109/JIOT.2024.340952511:18(29781-29797)Online publication date: 15-Sep-2024
  • (2024)A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN TechnologySN Computer Science10.1007/s42979-024-02707-65:4Online publication date: 27-Mar-2024
  • (2023)LoRaWAN Meets ML: A Survey on Enhancing Performance with Machine LearningSensors10.3390/s2315685123:15(6851)Online publication date: 1-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Sensor Networks
ACM Transactions on Sensor Networks  Volume 18, Issue 4
November 2022
619 pages
ISSN:1550-4859
EISSN:1550-4867
DOI:10.1145/3561986
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 07 March 2023
Online AM: 08 September 2022
Accepted: 15 August 2022
Revised: 19 July 2022
Received: 18 March 2022
Published in TOSN Volume 18, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. LoRaWAN
  2. LoRa
  3. LPWAN
  4. Internet of Things
  5. taxonomy

Qualifiers

  • Survey

Funding Sources

  • LOEWE initiative (Hessen State Ministry for Higher Education, Research and the Arts, Germany)
  • German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education
  • National Research Center for Applied Cybersecurity ATHENE

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)450
  • Downloads (Last 6 weeks)69
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Energy-Adaptive and Robust Monitoring for Smart Farms Based on Solar-Powered Wireless SensorsIEEE Internet of Things Journal10.1109/JIOT.2024.340952511:18(29781-29797)Online publication date: 15-Sep-2024
  • (2024)A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN TechnologySN Computer Science10.1007/s42979-024-02707-65:4Online publication date: 27-Mar-2024
  • (2023)LoRaWAN Meets ML: A Survey on Enhancing Performance with Machine LearningSensors10.3390/s2315685123:15(6851)Online publication date: 1-Aug-2023
  • (2023)Detecting Targeted Interference in NB-IoT2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT)10.1109/DCOSS-IoT58021.2023.00080(475-482)Online publication date: Jun-2023
  • (2023)Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management SchemeIEEE Access10.1109/ACCESS.2023.329142011(68301-68315)Online publication date: 2023

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media

Get Access

Get Access

Login options

Full Access

References

References

[1]
Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, and Thomas Watteyne. 2017. Understanding the limits of LoRaWAN. IEEE Communications Magazine 55, 9 (92017), 34–40. DOI:
[2]
Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. 2017. Exploring the security vulnerabilities of LoRa. In Proceedings of the 2017 3rd IEEE International Conference on Cybernetics (CYBCONF). IEEE, 1–6.
[3]
Emekcan Aras, Nicolas Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, and Danny Hughes. 2017. Selective jamming of LoRaWAN using commodity hardware. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous’17). Association for Computing Machinery, 363–372. DOI:
[4]
Gildas Avoine and Loic Ferreira. 2018. Rescuing LoRaWAN 1.0. In Proceedings of the 22nd International Conference On Financial Cryptography and Data Security 2018. Springer, Berlin, 253–271. DOI:
[5]
Suman Bala, Dominique Barthel, and Säid Gharout. 2019. Separate session key generation approach for network and application flows in LoRaWAN. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC’19). Association for Computing Machinery, New York, NY, 870–879. DOI:
[6]
Elaine Barker. 2020. Recommendation for Key Management, Part 1: General, Special Publication (NIST SP). National Institute of Standards and Technology, Gaithersburg, MD. DOI:
[7]
Pamela Beltrán-García, Ponciano Jorge Escamilla-Ambrosio, Eleazar Aguirre-Anaya, and Abraham Rodríguez-Mota. 2020. Availability vulnerabilities evaluation to LoRaWAN. In Proceedings of the Telematics and Computing (Communications in Computer and Information Science), Miguel Félix Mata-Rivera, Roberto Zagal-Flores, and Cristian Barria-Huidobro (Eds.). Springer International Publishing, Cham, 333–351. DOI:
[8]
Thomas Bigler, Albert Treytl, and Thilo Sauter. 2020. Side-channel watermarking for LoRaWAN using robust inter-packet timing. In Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vol. 1. 1367–1370. DOI:
[9]
Alex Biryukov, Adi Shamir, and David Wagner. 2001. Real time cryptanalysis of A5/1 on a PC. In Proceedings of the Fast Software Encryption, Gerhard Goos, Juris Hartmanis, Jan van Leeuwen, and Bruce Schneier (Eds.). Springer, Berlin, 1–18.
[10]
Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2018. Analysis of LoRaWAN v1.1 security: Research paper. In Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects (SMARTOBJECTS’18). ACM, Association for Computing Machinery, 1–6.
[11]
Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2018. Security risk analysis of LoRaWAN and future directions. Future Internet 11, 1 (Dec.2018), 3. DOI:
[12]
Sébastien Canard and Loïc Ferreira. 2019. Extended 3-party ACCE and application to LoRaWAN 1.1. In Proceedings of the Progress in Cryptology—AFRICACRYPT 2019, Johannes Buchmann, Abderrahmane Nitaj, and Tajjeeddine Rachidi (Eds.). Springer International Publishing, Cham, 21–38. DOI:
[13]
Cesar Cerrudo, Esteban Martinez Fayo, and Matias Sequeira. 2020. LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems, How to Detect and Prevent Them. Technical Report.
[14]
Ning Chen, Aiqun Hu, and Hua Fu. 2021. LoRa radio frequency fingerprint identification based on frequency offset characteristics and optimized LoRaWAN access technology. In Proceedings of the 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Vol. 5. 1801–1807. DOI:
[15]
Florian Laurentiu Coman, Krzysztof Mateusz Malarski, Martin Nordal Petersen, and Sarah Ruepp. 2019. Security issues in internet of things: Vulnerability analysis of LoRaWAN, sigfox and NB-IoT. In Proceedings of the 2019 Global IoT Summit (GIoTS). 1–6. DOI:
[16]
Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Luigi Romano, Irene Bonetti, and Elena Spagnuolo. 2021. The protection of LP-WAN Endpoints via TEE: A chemical storage case study. In Proceedings of the 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 345–352. DOI:
[17]
Semtech Corporation. 2016. LoRaWAN—Simple Rate Adaptation Recommended Algorithm. Technical Report.
[18]
Cas J. F. Cremers. 2008. The scyther tool: Verification, falsification, and analysis of security protocols. In Proceedings of the Computer Aided Verification, Aarti Gupta and Sharad Malik (Eds.). Springer, Berlin, 414–418.
[19]
Daniele Croce, Michele Gucciardo, Stefano Mangione, Giuseppe Santaromita, and Ilenia Tinnirello. 2018. Impact of LoRa imperfect orthogonality: Analysis of link-level performance. IEEE Communications Letters 22, 4 (2018), 796–799. DOI:
[20]
Syed Muhammad Danish, Arfa Nasir, Hassaan Khaliq Qureshi, Ayesha Binte Ashfaq, Shahid Mumtaz, and Jonathan Rodriguez. 2018. Network intrusion detection system for jamming attack in LoRaWAN join procedure. In Proceedings of the 2018 IEEE International Conference on Communications (ICC). 1–6. DOI:
[21]
Poliana De Moraes and Arlindo Flavio Da Conceição. 2021. Protecting LoRaWan data against untrusted network servers. In Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing Communications (GreenCom) and IEEE Cyber, Physical Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics). 99–106. DOI:
[22]
Joris Delclef. 2018. Change Request: FOpts Encrpytion, Usage of FCntDown on the LoRaWAN L2 1.1 Specification. Technical Report. STMicroelectronics. Retrieved from https://lora-alliance.org/resource-hub/fopts-encryption-usage-fcntdwn-errata-lorawan-l2-11-specification.
[23]
Tahsin C. M. Dönmez and Ethiopia Nigussie. 2018. Security of join procedure and its delegation in LoRaWAN v1.1. Procedia Computer Science 134 (2018), 204–211. DOI:
[24]
Tahsin C. M. Dönmez and Ethiopia Nigussie. 2018. Security of LoRaWAN v1.1 in backward compatibility scenarios. Procedia Computer Science 134 (2018), 51–58. DOI:The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018)/The 13th International Conference on Future Networks and Communications (FNC-2018)/Affiliated Workshops.
[25]
Tahsin C.M. Dönmez and Ethiopia Nigussie. 2019. Key management through delegation for LoRaWAN based healthcare monitoring systems. In Proceedings of the 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT). 1–6. DOI:
[26]
Mohamed Eldefrawy, Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2019. Formal security analysis of LoRaWAN. Computer Networks 148 (2019), 328–339. DOI:
[27]
Bernat Carbonés Fargas and Martin Nordal Petersen. 2017. GPS-free geolocation using LoRa in low-power WANs. In Proceedings of the 2017 Global Internet of Things Summit (Giots). IEEE, 1–6. DOI:
[28]
Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, and Sylvain Guilley. 2020. Evaluation of side-channel key-recovery attacks on LoRaWAN end-device. In Proceedings of the Information Systems Security and Privacy, Paolo Mori, Steven Furnell, and Olivier Camp (Eds.). Springer International Publishing, Cham, 74–92. DOI:
[29]
FUOTA Working Group of the LoRa Alliance Technical Committee. 2019. FUOTA Process Summary—Technical Recommendation TR002 v1.0.0. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/fuota-process-summary-technical-recommendation-tr002-v100.
[30]
Alexander Gladisch, Simon Rietschel, Thomas Mundt, Johann Bauer, Johannes Goltz, and Simeon Wiedenmann. 2018. Securely connecting iot devices with LoRaWAN. In Proceedings of the 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4). 220–229. DOI:
[31]
Ana Goulart, Anitha Chennamaneni, Damiano Torre, Byul Hur, and Fadhil Y. Al-Aboosi. 2022. On wide-area IoT networks, lightweight security and their applications—a practical review. Electronics 11, 11 (Jan.2022), 1762. DOI:
[32]
Claire Goursaud and Jean-Marie Gorce. 2015. Dedicated networks for IoT: PHY/MAC state of the art and challenges. EAI Endorsed Transactions on Internet of Things 1, 1 (Oct.2015), 1–11. DOI:
[33]
Jialuo Han and Jidong Wang. 2018. An enhanced key management scheme for LoRaWAN. Cryptography 2, 4 (Nov2018), 34. DOI:
[34]
Jetmir Haxhibeqiri, Eli De Poorter, Ingrid Moerman, and Jeroen Hoebeke. 2018. A survey of LoRaWan for IoT: From technology to application. Sensors 18, 11 (2018), 3995. DOI:
[35]
Jetmir Haxhibeqiri, Floris Van den Abeele, Ingrid Moerman, and Jeroen Hoebeke. 2017. LoRa scalability: A simulation model based on interference measurements. Sensors 17, 6 (June2017), 1193. DOI:
[36]
Nur Hayati, Kalamullah Ramli, Susila Windarta, and Muhammad Suryanegara. 2022. A novel secure root key updating scheme for LoRaWANs based on CTR_AES DRBG 128. IEEE Access 10 (2022), 18807–18819. DOI:
[37]
Frank Hessel, Lars Almon, and Flor Álvarez. 2020. ChirpOTLE: A framework for practical LoRaWAN security evaluation. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, New York, NY, 306–316. DOI:
[38]
Frank Philipp Hessel. 2019. LoRaWAN Security Analysis: An Experimental Evaluation of Attacks. Master’s thesis. Technische Universität Darmstadt.
[39]
Ningning Hou and Yuanqinq Zheng. 2020. CloakLoRa: A covert channel over LoRa PHY. In Proceedings of the 2020 IEEE 28th International Conference on Network Protocols (ICNP). 1–11. DOI:
[40]
Max Ingham, Jims Marchang, and Deepayan Bhowmik. 2020. IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN. IET Information Security 14, 4 (2020), 368–379. DOI:
[41]
Martha N. Kamkuemah. 2021. Epistemic analysis of a key-management vulnerability in LoRaWAN. In Proceedings of the 2021 18th International Conference on Privacy, Security and Trust (PST). 1–7. DOI:
[42]
Jaehyu Kim and JooSeok Song. 2017. A simple and efficient replay attack prevention scheme for LoRaWAN. In Proceedings of the 2017 the 7th International Conference on Communication and Network Security. ACM, 32–36. DOI:
[43]
Reinhard Kloibhofer, Erwin Kristen, and Luca Davoli. 2020. LoRaWAN with HSM as a security improvement for agriculture applications. In Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops (Lecture Notes in Computer Science), António Casimiro, Frank Ortmeier, Erwin Schoitsch, Friedemann Bitsch, and Pedro Ferreira (Eds.). Springer International Publishing, Cham, 176–188. DOI:
[44]
Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, and Christian Reuter. 2022. LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios. Transactions on Emerging Telecommunications Technologies 33, 5 (2022). DOI:
[45]
JungWoon Lee, DongYeop Hwang, JiHong Park, and Ki-Hyung Kim. 2017. Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. In Proceedings of the 2017 International Conference on Information Networking (ICOIN). IEEE, 549–551. DOI:
[46]
Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, and Srdjan Čapkun. 2018. I send, therefore i leak: Information leakage in low-power wide area networks. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (Stockholm, Sweden) (WiSec’18). Association for Computing Machinery, New York, NY, 23–33. DOI:
[47]
Pierluigi Locatelli, Pietro Spadaccino, and Francesca Cuomo. 2021. Hijacking downlink path selection in LoRaWAN. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM). 1–6. DOI:
[48]
LoRa Alliance Technical Committee. 2017. LoRaWAN™ Backend Interfaces 1.0 Specification. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-back-end-interfaces-v10.
[49]
LoRa Alliance Technical Committee. 2017. LoRaWAN™ Specification v1.1. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v11.
[50]
LoRa Alliance Technical Committee. 2018. LoRaWAN™ Specification V1.0.3. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v103.
[51]
LoRa Alliance Technical Committee. 2018. Technical Recommendations for Preventing State Synchronization Issues around LoRaWAN™ 1.0.x Join Procedure. Technical Report. LoRa Alliance.
[52]
LoRa Alliance Technical Committee. 2020. LoRaWAN ® L2 1.0.4 Specification (TS001-1.0.4). Technical Report. LoRa Alliance.
[53]
LoRa Alliance Technical Committee. 2020. LoRaWAN® Backend Interfaces Technical Specification (TS002-1.1.0). Technical Report. Semtech Corporation. 85 pages.
[54]
LoRa Alliance Technical Committee Regional Parameters Workgroup. 2020. RP002-1.0.1 LoRaWAN® Regional Parameters. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/rp2-101-lorawanr-regional-parameters.
[55]
Slim Loukil, Lamia Chaari Fourati, Anand Nayyar, and K.-W.-A. Chee. 2022. Analysis of LoRaWAN 1.0 and 1.1 protocols security mechanisms. Sensors 22, 10 (Jan.2022), 3717. DOI:
[56]
Frederik Mårlind and Ismail Butun. 2020. Activation of LoRaWAN end devices by using public key cryptography. In Proceedings of the 2020 4th Cyber Security in Networking Conference (CSNet). 1–8. DOI:
[57]
Ivan Martinez, Philippe Tanguy, and Fabienne Nouvel. 2019. On the performance evaluation of LoRaWAN under jamming. In Proceedings of the 2019 12th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE. DOI:
[58]
Ross McPherson and James Irvine. 2020. Secure decentralised deployment of LoRaWAN sensors. IEEE Sensors Journal 21, 1 (2020), 1–1. DOI:
[59]
Kais Mekki, Eddy Bajic, Frederic Chaxel, and Fernand Meyer. 2019. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 5, 1 (2019), 1–7.
[60]
Konstantin Mikhaylov, Radek Fujdiak, Ari Pouttu, Voznak Miroslav, Lukas Malina, and Petr Mlynek. 2019. Energy attack in LoRaWAN: Experimental validation. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES’19). ACM, New York, NY, Article 74, 6 pages. DOI:
[61]
Stefano Milani and Ioannis Chatzigiannakis. 2021. Design, analysis, and experimental evaluation of a new secure rejoin mechanism for LoRaWAN using elliptic-curve cryptography. Journal of Sensor and Actuator Networks 10, 2 (June2021), 36. DOI:
[62]
Robert Miller. 2016. Lora security: Building a secure LoRa solution. MWR Labs Whitepaper (2016).
[63]
Mohammad Mezanur Rahman Monjur, Joseph Heacock, Rui Sun, and Qiaoyan Yu. 2021. An attack analysis framework for LoRaWAN applied advanced manufacturing. In Proceedings of the 2021 IEEE International Symposium on Technologies for Homeland Security (HST). 1–7. DOI:
[64]
SeungJae Na, DongYeop Hwang, WoonSeob Shin, and Ki-Hyung Kim. 2017. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In Proceedings of the 2017 International Conference on Information Networking (ICOIN). IEEE, 718–720. DOI:
[65]
Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, and Bong Jun Choi. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS’20). Association for Computing Machinery, New York, NY, 2117–2119. DOI:
[66]
Sarra Naoui, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. 2020. Novel enhanced LoRaWAN framework for smart home remote control security. Wireless Personal Communications 110, 4 (Feb.2020), 2109–2130. DOI:
[67]
Sarra Naoui, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. 2017. Trusted third party based key management for enhancing LoRaWAN security. In Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). 1306–1313. DOI:
[68]
Jorge Navarro-Ortiz, Natalia Chinchilla-Romero, Juan J. Ramos-Munoz, and Pablo Munoz-Luengo. 2019. Improving hardware security for LoRaWAN. In Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN). 1–6. DOI:
[69]
Hassan Noura, Tarif Hatoum, Ola Salman, Jean-Paul Yaacoub, and Ali Chehab. 2020. LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet of Things 12 (Dec.2020), 100303. DOI:
[70]
Bogdan Oniga, Vasile Dadarlat, Eli De Poorter, and Adrian Munteanu. 2017. Analysis, design and implementation of secure LoRaWAN sensor networks. In Proceedings of the 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 421–428. DOI:
[71]
Toni Perković and Dino Siriščević. 2020. Low-cost LoRaWAN jammer. In Proceedings of the 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech). 1–6. DOI:
[72]
Sumesh J. Philip, James M. McQuillan, and Oluwatoba Adegbite. 2020. LoRaWAN v1.1 Security: Are we in the clear yet? In Proceedings of the 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys). 112–118. DOI:
[73]
Ondrej Pospisil, Radek Fujdiak, Konstantin Mikhaylov, Henri Ruotsalainen, and Jiri Misurec. 2021. Testbed for LoRaWAN Security: Design and validation through man-in-the-middle attacks study. Applied Sciences 11, 16 (Jan.2021), 7642. DOI:
[74]
Andri Rahmadhani and Fernando Kuipers. 2018. When LoRaWAN frames collide. In Proceedings of the 12th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (ACM WiNTECH’18). DOI:
[75]
Brecht Reynders, Wannes Meert, and Sofie Pollin. 2016. Range and coexistence analysis of long range unlicensed communication. In Proceedings of the 2016 23rd International Conference on Telecommunications (ICT). IEEE, 1–6. DOI:
[76]
Victor Ribeiro, Raimir Holanda, Alex Ramos, and Joel J. P. C. Rodrigues. 2020. Enhancing key management in LoRaWAN with permissioned blockchain. Sensors 20, 11 (May2020), 3068. DOI:
[77]
Alessandra Rizzardi, Sabrina Sicari, and Alberto Coen-Porisini. 2022. Analysis on functionalities and security features of internet of things related protocols. Wireless Networks 28, 7 (2022), 2857–2887. DOI:
[78]
Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, and Bart Preneel. 2017. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’17). Association for Computing Machinery, New York, NY, 58–63. DOI:
[79]
Jan Ruge, Jiska Classen, Francesco Gringoli, and Matthias Hollick. 2020. Frankenstein: Advanced wireless fuzzing to exploit new bluetooth escalation targets. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 19–36.
[80]
Ramon Sanchez-Iborra, Jesús Sánchez-Gómez, Salvador Pérez, Pedro Fernández, José Santa, José Hernández-Ramos, and Antonio Skarmeta. 2018. Enhancing LoRaWAN security through a lightweight and authenticated key management approach. Sensors 18, 6 (2018), 1833. DOI:
[81]
Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, and Jean-Pierre Seifert. 2016. Practical attacks against privacy and availability in 4G/LTE mobile communication systems. In Proceedings of the 2016 Network and Distributed System Security Symposium. Internet Society. DOI:
[82]
Vladislav Skorpil, Vaclav Oujezsky, and Ludek Palenik. 2018. Internet of things security overview and practical demonstration. In Proceedings of the 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 1–7. DOI:
[83]
Nicolas Sornin, Miguel Luis, Thomas Eirich, Thorsten Kramp, and Olivier Hersent. 2015. LoRaWAN™ Specification v1.0. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v10.
[84]
Nicolas Sornin, Miguel Luis, Thomas Eirich, Thorsten Kramp, and Olivier Hersent. 2016. LoRaWAN™ Specification v1.0.1. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v101.
[85]
Nicolas Sornin, Miguel Luis, Thomas Eirich, Thorsten Kramp, and Olivier Hersent. 2016. LoRaWAN™ Specification v1.0.2. Technical Report. LoRa Alliance. Retrieved from https://lora-alliance.org/resource-hub/lorawanr-specification-v102.
[86]
Pietro Spadaccino, Domenico Garlisi, Francesca Cuomo, Giorgio Pillon, and Patrizio Pisani. 2022. Discovery privacy threats via device de-anonymization in LoRaWAN. Computer Communications 189 (May2022), 1–10. DOI:
[87]
Woo-Jin Sung, Hyeong-Geun Ahn, Jong-Beom Kim, and Seong-Gon Choi. 2018. Protecting end-device from replay attack on LoRaWAN. In Proceedings of the 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE, 167–171. DOI:
[88]
Stefano Tomasin, Simone Zulian, and Lorenzo Vangelista. 2017. Security analysis of LoRaWAN join procedure for internet of things networks. In Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 1–6. DOI:
[89]
Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, and Chuan-Tian Wu. 2022. Secure LoRaWAN root key update scheme for IoT environment. In Proceedings of the Mobile Internet Security (Communications in Computer and Information Science). Ilsun You, Hwankuk Kim, Taek-Young Youn, Francesco Palmieri, and Igor Kotenko (Eds.). Springer Nature, 3–15. DOI:
[90]
Kun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, and Huei-Tang Luo. 2020. A LoRaWAN based energy efficient data encryption method. In Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, Leonard Barolli, Fatos Xhafa, and Omar K. Hussain (Eds.). Springer International Publishing, Cham, 493–502. DOI:
[91]
Floris Van den Abeele, Jetmir Haxhibeqiri, Ingrid Moerman, and Jeroen Hoebeke. 2017. Scalability analysis of large-scale lorawan networks in NS-3. IEEE Internet of Things Journal 4, 6 (Dec.2017), 2186–2198. DOI:
[92]
Eef van Es. 2018. LoRaWAN Vulerability Analysis – (In)validation of Possible Vulnerabilities in the LoRaWAN Protocol Specification. Master’s thesis. Open University of the Netherlands.
[93]
Eef van Es, Harald Vranken, and Arjen Hommersom. 2018. Denial-of-service attacks on LoRaWAN. In Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 17. DOI:
[94]
Mathy Vanhoef and Frank Piessens. 2017. Key reinstallation attacks: Forcing nonce reuse in WPA2. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, 1313–1328. DOI:
[95]
Prachi V. Wadatkar, Bharat S. Chaudhari, and Marco Zennaro. 2019. Impact of interference on LoRaWAN link performance. In Proceedings of the 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA). 1–5. DOI:
[96]
Stephan Wesemeyer, Ioana Boureanu, Zach Smith, and Helen Treharne. 2020. Extensive security verification of the LoRaWAN key-establishment: Insecurities patches. In Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroSP). 425–444. DOI:
[97]
Jiming Xu, You Tang, Yujian Wang, and Xinán Wang. 2019. A practical side-channel attack of a LoRaWAN module using deep learning. In Proceedings of the 2019 IEEE 13th International Conference on Anti-Counterfeiting, Security, and Identification (ASID). 17–21. DOI:
[98]
Xueying Yang. 2017. LoRaWAN: Vulnerability Analysis and Practical Exploitation. Master’s thesis. Delft University of Technology.
[99]
Xueying Yang, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. 2018. Security vulnerabilities in LoRaWAN. In Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 129–140. DOI:
[100]
Ilsun You, Soonhyun Kwon, Gaurav Choudhary, Vishal Sharma, and Jung Seo. 2018. An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18, 6 (Jun2018), 1888. DOI:
[101]
Simone Zulian. 2016. Security Threat Analysis and Countermeasures for LoRaWAN Join Procedure. Master’s thesis. Universitá degli Studi di Padova.