Availability vulnerabilities evaluation to lorawan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

LoRaWAN as one of the newest protocols in the Internet of Things ecosystem represents a whole new area in cybersecurity research. In this protocol, security is focused on data integrity and confidentiality and most the research that analyse its security only examined the availability property of the protocol from the performance or join-procedure perspective. In this paper we aim to provide evidence supporting a major interest in the availability property. Therefore we describe five identified vulnerabilities that have not been thoroughly analysed in the literature together with exemplification of how to exploit them to perform cyberattacks, specifically for bidirectional communication. We also make the case for IoT gateway as a main target for the Committing Uplink/Downlink Communication, Theft the Gateway for Packet Monitoring, Data Loss, Delay in Data Reception and Battery Consumption attacks. We also provide details of the experiments and discussion of the obtained data. Finally, we include a discussion of some mitigations activities for such vulnerabilities.

Original languageEnglish
Title of host publicationTelematics and Computing - 9th International Congress, WITCOM 2020, Proceedings
EditorsMiguel Félix Mata-Rivera, Roberto Zagal-Flores, Cristian Barria-Huidobro
PublisherSpringer Science and Business Media Deutschland GmbH
Pages333-351
Number of pages19
ISBN (Print)9783030625535
DOIs
StatePublished - 2020
Event9th International Congress on Telematics and Computing, WITCOM 2020 - Puerto Vallarta, Mexico
Duration: 2 Nov 20206 Nov 2020

Publication series

NameCommunications in Computer and Information Science
Volume1280
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference9th International Congress on Telematics and Computing, WITCOM 2020
Country/TerritoryMexico
CityPuerto Vallarta
Period2/11/206/11/20

Keywords

  • Availability
  • Cyberattacks
  • Cybersecurity
  • LoRaWAN
  • Vulnerabilities

Fingerprint

Dive into the research topics of 'Availability vulnerabilities evaluation to lorawan'. Together they form a unique fingerprint.

Cite this