22 research outputs found
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of
deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are
often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security
flaws. This paper aims to explore the security vulnerabilities of IoT devices particularly that use Low Power Wide Area Networks
(LPWANs). In this work, LoRaWAN based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was
designed and simulated with the use of a predictive model of the device data generation. The paper demonstrated that by predicting
the data generation model, jamming attack can be carried out to block devices from sending data successfully. This research will
aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of
IoT networks in general
Security analysis of IoT networks and platforms
With the recent increase in the adoption of Internet of Things (IoT) technology globally, cybersecurity-related issues have been raised, particularly with the limitations of IoT devices, privacy and other security standards guiding IoT development as wireless technology evolves. With the enterprise and the massive IoT market expected to reach 1.2 B in 2024 respectively, according to Gartner, and several operational vertical IoT use cases and platforms experiencing cyber vulnerabilities. Based on the findings from our recent LPWANs IoT testbeds and their operational performance in certain use case scenarios, this paper summarizes the key wireless technology security requirements for IoT deployments. We first compare the security requirements of legacy and emerging IoT technologies as it relates to smart city applications and examined the effectiveness of the existing countermeasure opportunities as it affects the overall system performance in critical and non-critical machine type communications. We concluded by recommending countermeasures opportunities and frameworks to secure industrial IoT platforms to cope with future cybersecurity vulnerabilitie
Performance Evaluation of Class A LoRa Communications
Recently, Low Power Wide Area Networks (LPWANs) have attracted a great interest
due to the need of connecting more and more devices to the so-called Internet of Things
(IoT). This thesis explores LoRa’s suitability and performance within this paradigm,
through a theoretical approach as well as through practical data acquired in multiple field
campaigns. First, a performance evaluation model of LoRa class A devices is proposed. The
model is meant to characterize the performance of LoRa’s Uplink communications where
both physical layer (PHY) and medium access control (MAC) are taken into account. By
admitting a uniform spatial distribution of the devices, the performance characterization of
the PHY-layer is studied through the derivation of the probability of successfully decoding
multiple frames that were transmitted with the same spreading factor and at the same time.
The MAC performance is evaluated by admitting that the inter-arrival time of the frames
generated by each LoRa device is exponentially distributed. A typical LoRaWAN operating
scenario is considered, where the transmissions of LoRa Class A devices suffer path-loss,
shadowing and Rayleigh fading. Numerical results obtained with the modeling methodology
are compared with simulation results, and the validation of the proposed model is discussed
for different levels of traffic load and PHY-layer conditions. Due to the possibility of
capturing multiple frames simultaneously, the maximum achievable performance of the
PHY/MAC LoRa scheme according to the signal-to-interference-plus-noise ratio (SINR)
is considered. The contribution of this model is primarily focused on studying the average
number of successfully received LoRa frames, which establishes a performance upper bound
due to the optimal capture condition considered in the PHY-layer. In the second stage
of this work a practical LoRa point-to-point network was deployed to characterize LoRa’s
performance in a practical way. Performance was assessed through data collected in
the course of several experiments, positioning the transmitter in diverse locations and
environments. This work reports statistics of the received packets and different metrics
gathered from the physical-layer
An analysis of security protocols for lightweight systems
Mathematical Science
A survey of IoT protocols and their security issues through the lens of a generic IoT stack
International audienceThe Internet of things (IoT) is rapidly growing, and many security issues relate to its wireless technology. These security issues are challenging because IoT protocols are heterogeneous, suit different needs, and are used in different application domains. From this assessment, we identify the need to provide a homogeneous formalism applying to every IoT protocols. In this survey, we describe a generic approach with twofold challenges. The first challenge we tackle is the identification of common principles to define a generic approach to compare IoT protocol stack. We base the comparison on five different criteria: the range, the openness of the protocol, the interoperability, the topology and the security practices of these IoT protocols. The second challenge we consider is to find a generic way to describe fundamental IoT attacks regardless of the protocol used. This approach exposes similar attacks amongst different IoT protocols and is divided into three parts: attacks focusing on packets (passive and active cryptographic attacks), attacks focusing on the protocol (MITM, Flooding, Sybil, Spoofing, Wormhole attacks) and attacks focusing on the whole system (Sinkhole, Selective forwarding attacks). It also highlights which mechanisms are different between two protocols to make both of them vulnerable to an attack. Finally, we draw some lessons and perspectives from this transversal study
IoT network : design and implementation
Dissertação para obtenção do grau de mestre em Engenharia Eletrónica e de TelecomunicaçõesIn recent years a new concept known in the anglo-saxonic language as IoT (Internet of Things) has gained prominence in the world of technology. IoT's main objective is to allow various types of physical objects, such as cars, houses and cities to transmit the information they obtain autonomously through sensors, to platforms that receive and use them intelligently, forming a network of interconnected objects, without any kind of human intervention.
To understand this concept, a study was made of the networks that underlie this concept, LPWA (Low Power Wide Area Networks), and in more detail to LoRa technology. In order to estimate the coverage of this technology, a theoretical planning was performed using the OH model (Okumura-Hata), and based on the results obtained, an electromagnetic simulator (CloudRF), was used, which allowed to estimate in more detail the coverage in the area of study. In order to validate the results obtained theoretically and by simulation, a set of meas-urements was made in the field in some points of the city of Aveiro.
From the global analysis of the obtained results, it was concluded that LoRa technology is in fact quite feasible to be used in an implementation of an IoT network in an urban environ-ment. The OH model when adapted with the appropriate coverage margins for the type of study environment allows a good approximation in terms of outdoor coverage. Despite being very sensitive to movements, it was possible to obtain distances up to 2 km in a mostly urban prop-agation environment, and more than 5 km in a more open area with a greater line of sight.Nos últimos anos um novo conceito conhecido na linguagem anglo-saxónica como IoT (In-ternet of Things) ganhou destaque no mundo da tecnologia. A IoT tem como principal objetivo permitir que diversos tipos de objetos fÃsicos, como por exemplo carros, casas e cidades consi-gam transmitir a informação que obtêm de forma autónoma através de sensores, para platafor-mas que as recebem e as utilizam de forma inteligente, moldando assim uma rede de objetos interligados, sem existir qualquer tipo de intervenção humana.
Para se perceber este conceito, foi efetuado um estudo às redes que servem de base a este conceito, as redes LPWA (Low Power Wide Area), e em mais detalhe à tecnologia LoRa. De forma a estimar a cobertura desta tecnologia, foi efetuado um planeamento teórico utilizando o modelo de OH (Okumura-Hata), e com base nos resultados obtidos, recorreu-se a um simulador electromagnético, o CloudRF, que permitiu estimar mais em detalhe a cobertura para a zona de Aveiro. De forma a validar os resultados obtidos teoricamente e por simulação, foi efetuado um conjunto de medidas em campo em alguns pontos da cidade de Aveiro.
Da análise global de resultados obtidos, concluiu-se que a tecnologia LoRa é de facto bas-tante viável para ser utilizada numa implementação de uma rede IoT num ambiente urbano. O modelo de OH quando adaptado com as margens de cobertura adequadas para o tipo de ambi-ente em estudo permite obter uma boa aproximação em termos de cobertura outdoor. Apesar de ser bastante sensÃvel a movimentações, a tecnologia LoRa através das medidas realizadas permitiu obter coberturas até 2 km num ambiente de propagação maioritariamente urbano, e superiores a 5 km numa área mais aberta e com uma maior linha de vista.N/
Internet of Things for Smart Cities: user interface and security issues
The Internet of Things (IoT) revolution is drastically changing the concept of networking: everyday objects are becoming smart and interconnected, forming a densely populated network. This work consists in the improvement of an existing middleware, providing a way to seamlessy connect the final user interface to the 'things' world, and in the development of a security framework to manage read and write permissions owned by the users with respect to the 'things' and their observation