4.6 Article

Investigation on Security Risk of LoRaWAN: Compatibility Scenarios

Journal

IEEE ACCESS
Volume 10, Issue -, Pages 101825-101843

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3208171

Keywords

Internet of Things; Security; Protocols; Low-power wide area networks; Sensors; Servers; Monitoring; Risk management; Internet of Things; threats; LPWAN; LoRa; risk assessment; vulnerability

Ask authors/readers for more resources

This paper focuses on the vulnerabilities of LoRaWAN technology in the context of compatibility. It analyzes the LoRaWAN architectures and discusses basic security concepts related to compatibility scenarios. The study reveals that there are still unresolved vulnerabilities in compatibility scenarios.
The LoRaWAN standard comes from the low-power wide area network (LPWAN) technology suitable for developing Internet of Things (IoT) systems that are poised to disrupt the semiconductor industry. Even as a widespread technology used for diverse applications, security issues of long-range (LoRa) networks and devices remain a major challenge. Although the LoRa Alliance enhanced the security and the network architecture of LoRaWAN from version 1.0 to version 1.1, the last version still faces some drawbacks such as vulnerability to attacks. Some works have assessed LoRaWAN (v1.0 and v1.1) security risks and vulnerabilities. Moreover, all these specifications must coexist with each other, which makes compatibility an important factor in ensuring the sustainability of this technology. For this reason, we study the vulnerability of the LoRaWAN protocol in the context of compatibility. Hence, we consider four compatibility scenarios and possible cyber-attacks when connecting devices from the two mentioned versions. In this paper, we analyze the LoRaWAN architectures and then discuss the basic security concepts related to the compatibility scenarios between homogeneous or heterogeneous systems integrating the two LoRaWAN versions. After that, we investigate and identify the potential security risks and network vulnerabilities in LoRaWAN technology. We establish a catalog of vulnerabilities for LoRaWAN on a methodological framework. The catalog contains five vulnerabilities related to LoRaWAN v1.0.x and v1.1 and seven vulnerabilities related to LoRaWAN v1.0.x. Then, we check if these vulnerabilities could be applied to the compatibility scenarios. We observe that the majority of vulnerabilities mitigated in LoRaWAN v1.1 remain present in compatibility scenarios.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available