TY - GEN
T1 - Availability vulnerabilities evaluation to lorawan
AU - Beltrán-García, Pamela
AU - Escamilla-Ambrosio, Ponciano Jorge
AU - Aguirre-Anaya, Eleazar
AU - Rodríguez-Mota, Abraham
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - LoRaWAN as one of the newest protocols in the Internet of Things ecosystem represents a whole new area in cybersecurity research. In this protocol, security is focused on data integrity and confidentiality and most the research that analyse its security only examined the availability property of the protocol from the performance or join-procedure perspective. In this paper we aim to provide evidence supporting a major interest in the availability property. Therefore we describe five identified vulnerabilities that have not been thoroughly analysed in the literature together with exemplification of how to exploit them to perform cyberattacks, specifically for bidirectional communication. We also make the case for IoT gateway as a main target for the Committing Uplink/Downlink Communication, Theft the Gateway for Packet Monitoring, Data Loss, Delay in Data Reception and Battery Consumption attacks. We also provide details of the experiments and discussion of the obtained data. Finally, we include a discussion of some mitigations activities for such vulnerabilities.
AB - LoRaWAN as one of the newest protocols in the Internet of Things ecosystem represents a whole new area in cybersecurity research. In this protocol, security is focused on data integrity and confidentiality and most the research that analyse its security only examined the availability property of the protocol from the performance or join-procedure perspective. In this paper we aim to provide evidence supporting a major interest in the availability property. Therefore we describe five identified vulnerabilities that have not been thoroughly analysed in the literature together with exemplification of how to exploit them to perform cyberattacks, specifically for bidirectional communication. We also make the case for IoT gateway as a main target for the Committing Uplink/Downlink Communication, Theft the Gateway for Packet Monitoring, Data Loss, Delay in Data Reception and Battery Consumption attacks. We also provide details of the experiments and discussion of the obtained data. Finally, we include a discussion of some mitigations activities for such vulnerabilities.
KW - Availability
KW - Cyberattacks
KW - Cybersecurity
KW - LoRaWAN
KW - Vulnerabilities
UR - http://www.scopus.com/inward/record.url?scp=85096603411&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-62554-2_25
DO - 10.1007/978-3-030-62554-2_25
M3 - Contribución a la conferencia
AN - SCOPUS:85096603411
SN - 9783030625535
T3 - Communications in Computer and Information Science
SP - 333
EP - 351
BT - Telematics and Computing - 9th International Congress, WITCOM 2020, Proceedings
A2 - Mata-Rivera, Miguel Félix
A2 - Zagal-Flores, Roberto
A2 - Barria-Huidobro, Cristian
PB - Springer Science and Business Media Deutschland GmbH
T2 - 9th International Congress on Telematics and Computing, WITCOM 2020
Y2 - 2 November 2020 through 6 November 2020
ER -