12 research outputs found

    Selective Jamming of LoRaWAN using Commodity Hardware

    Full text link
    Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and urgent. This paper highlights security issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow modulation type in the protocol. We exploit these issues to develop a suite of practical attacks based around selective jamming. These attacks are conducted and evaluated using commodity hardware. The paper concludes by suggesting a range of countermeasures that can be used to mitigate the attacks.Comment: Mobiquitous 2017, November 7-10, 2017, Melbourne, VIC, Australi

    A Light-Weight Operating System for Internet of Things Devices

    No full text
    Nowadays, all around of us has been surrounded by wireless devices. More than a decade, engineers have been using these wireless devices in industry to measure environmental data. Large networks, which are formed by hundreds or thousands sensor nodes, are not easy to build, maintain and observe. Moreover, with the trending concept called Internet of Things, devices have gained different functionalities and the different type of networks started to develop. In order to design an efficient and low cost sensor and IOT network, a different type of architecture in both network side and low-level software side must be developed. Designing a specific operating system motivated us earlier part in this project. After detailed investigation, it is revealed that resource-constrained embedded devices need a new type of embedded operating system specifically developed for sensor and IOT network. Moreover, in the market, there are many choice for embedded operating systems. However, an open-source operating system for embedded devices in the sensor and IOT networks is needed and could be useful for educational purposes as well as commercial purposes. In the light of the motivations that is mentioned at the paragraph above, a light-weight embedded operating system has been designed and developed from scratch in this thesis. In addition to that, a radio protocol and an IOT service layer which act as middleware in the network have been designed and implemented into the embedded operating system. All the background lies behind this project and the designing steps are explained in detail in this thesis. In addition to this, a conference paper about the operating system particularly IOT service layer is being written. Keil uVision5 software development platformwas used to develop the mentioned operating system in this project. Detailed investigation and research were done about embedded systems, operating systems, distributed systems and wireless communication before the project. Afterwards, entire software libraries for the kernel and hardware drivers were developed from scratch by using C and Assembly language. Since the project is focused on embedded devices, one of the low-power processor architectures called ARM Cortex-M0 architecture has been used as the target platform. An SOC from Nordic Semiconductor called NRF51822, which contains this processor architecture, is used inside of the devices in this project. In order to test and validate the results and functionality of the system, two different development kits have been used provided by the vendor company. Detailed tests scenarios have been tried and a small working sensor network/cluster has been formed by using these devices and the operating system. At the end of the project, a small size operating system which requires around 8Kb of flash memory and 7Kb of RAM, has been created. Tasks which is given to devices has been efficiently executed without causing any overhead or failure. In addition to this, functionality which is provided by the IOT layer has been achieved as well. Two types of device are introduced with the proposed IOT layer. A standard component for sensor and IOT networks called node device and supervisor component of the network called manager device are tested. After tests and verifications, it has been seen that resource and information sharing across the network is achieved. In this thesis project, resource-constrained low profile embedded devices and architectures selected as the target device group. It is revealed that using a specifically design operating system, these types of devices could be used in many applications with reasonable prices. Moreover, the proposed operating system layer could bring a new way of thinking on the sensor and IOT device networks and could be used as the solution for problems and challenges. Furthermore, with the user-friendly design particular operating system could be very useful in educational purposes

    Exploring the security vulnerabilities of LoRa

    No full text
    Internet-of-Things (IoT) deployments increasingly incorporate long range communication technologies. To support this transition, wide area IoT deployments are employing LoRa as their communication technology of choice due to its low power consumption and long range. The security of LoRa networks and devices is currently being put to the test in the wild, and has already become a major challenge. New features and characteristics of LoRa technology also intorduce new vulnerabilities against security attacks. In this paper, we investigate potential security vulnerabilities in LoRa. In particular, we analyze the LoRa network stack and discuss the possible susceptibility of LoRa devices to different types of attacks using commercial-off-the-shelf hardware. Our analysis shows that the long range transmissions of LoRa are vulnerable to multiple security attacks.</p

    Exploring the security vulnerabilities of LoRa

    Get PDF
    © 2017 IEEE. Internet-of-Things (IoT) deployments increasingly incorporate long range communication technologies. To support this transition, wide area IoT deployments are employing LoRa as their communication technology of choice due to its low power consumption and long range. The security of LoRa networks and devices is currently being put to the test in the wild, and has already become a major challenge. New features and characteristics of LoRa technology also intorduce new vulnerabilities against security attacks. In this paper, we investigate potential security vulnerabilities in LoRa. In particular, we analyze the LoRa network stack and discuss the possible susceptibility of LoRa devices to different types of attacks using commercial-off-the-shelf hardware. Our analysis shows that the long range transmissions of LoRa are vulnerable to multiple security attacks.status: publishe

    A Low-Power Hardware Platform for Smart Environment as a Call for More Flexibility and Re-Usability

    No full text
    status: publishe

    MicroVault: Reliable Storage Unit for IoT Devices

    No full text
    status: publishe

    Towards More Scalable and Secure LPWAN Networks Using Cryptographic Frequency Hopping

    No full text
    status: publishe

    Chimera: A low-power reconfigurable platform for Internet of Things

    No full text
    status: accepte

    Selective jamming of LoRaWAN using commodity hardware

    No full text
    Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and urgent. This paper highlights security issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow modulation type in the protocol. We exploit these issues to develop a suite of practical attacks based around selective jamming. These attacks are conducted and evaluated using commodity hardware. The paper concludes by suggesting a range of countermeasures that can be used to mitigate the attacks.status: publishe
    corecore