Next Article in Journal
Biomechanical Analysis of Posterior Ligaments of Cervical Spine and Laminoplasty
Next Article in Special Issue
FLINT: Flows for the Internet of Things
Previous Article in Journal
Experimental Investigation of the Static and Dynamic Compression Characteristics of Limestone Based on Its Initial Damage
Article

Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study

1
Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology, Technicka 12, 61600 Brno, Czech Republic
2
Centre for Wireless Communications, University of Oulu, Erkki Koiso-Kanttilan katu 3, 90014 Oulu, Finland
3
Institute of IT Security Research, St. Pölten University of Applied Sciences, Campus-Platz 1, 3100 St. Pölten, Austria
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Academic Editor: Dan García Carrillo
Appl. Sci. 2021, 11(16), 7642; https://doi.org/10.3390/app11167642
Received: 28 June 2021 / Revised: 8 August 2021 / Accepted: 17 August 2021 / Published: 20 August 2021
(This article belongs to the Special Issue Low-Power Wide Area Networks (LPWAN): Latest Advances and Prospects)
The low-power wide-area (LPWA) technologies, which enable cost and energy-efficient wireless connectivity for massive deployments of autonomous machines, have enabled and boosted the development of many new Internet of things (IoT) applications; however, the security of LPWA technologies in general, and specifically those operating in the license-free frequency bands, have received somewhat limited attention so far. This paper focuses specifically on the security and privacy aspects of one of the most popular license-free-band LPWA technologies, which is named LoRaWAN. The paper’s key contributions are the details of the design and experimental validation of a security-focused testbed, based on the combination of software-defined radio (SDR) and GNU Radio software with a standalone LoRaWAN transceiver. By implementing the two practical man-in-the-middle attacks (i.e., the replay and bit-flipping attacks through intercepting the over-the-air activation procedure by an external to the network attacker device), we demonstrate that the developed testbed enables practical experiments for on-air security in real-life conditions. This makes the designed testbed perspective for validating the novel security solutions and approaches and draws attention to some of the relevant security challenges extant in LoRaWAN. View Full-Text
Keywords: LoRa; LoRaWAN; security; encryption; testbed; SDR; IoT; LPWAN LoRa; LoRaWAN; security; encryption; testbed; SDR; IoT; LPWAN
Show Figures

Figure 1

MDPI and ACS Style

Pospisil, O.; Fujdiak, R.; Mikhaylov, K.; Ruotsalainen, H.; Misurec, J. Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study. Appl. Sci. 2021, 11, 7642. https://doi.org/10.3390/app11167642

AMA Style

Pospisil O, Fujdiak R, Mikhaylov K, Ruotsalainen H, Misurec J. Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study. Applied Sciences. 2021; 11(16):7642. https://doi.org/10.3390/app11167642

Chicago/Turabian Style

Pospisil, Ondrej, Radek Fujdiak, Konstantin Mikhaylov, Henri Ruotsalainen, and Jiri Misurec. 2021. "Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study" Applied Sciences 11, no. 16: 7642. https://doi.org/10.3390/app11167642

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop