A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol
Autor: | Maode Ma, Xiao-Hong Li, Shu-Yang Gao |
---|---|
Přispěvatelé: | School of Electrical and Electronic Engineering |
Jazyk: | angličtina |
Rok vydání: | 2019 |
Předmět: |
replay attack
Computer science 02 engineering and technology Computer security computer.software_genre Encryption lcsh:Chemical technology Biochemistry One-time password Article Analytical Chemistry Server 0202 electrical engineering electronic engineering information engineering Defense lorawan awareness lcsh:TP1-1185 Electrical and Electronic Engineering Instrumentation Replay attack Network packet business.industry Testbed 020206 networking & telecommunications Awareness Atomic and Molecular Physics and Optics defense Wide area network Key (cryptography) Electrical and electronic engineering [Engineering] 020201 artificial intelligence & image processing business computer Wireless sensor network Countermeasure (computer) |
Zdroj: | Sensors, Vol 19, Iss 23, p 5122 (2019) Sensors (Basel, Switzerland) Sensors Volume 19 Issue 23 |
ISSN: | 1424-8220 |
Popis: | Low power wide area network (LoRaWAN) protocol has been widely used in various fields. With its rapid development, security issues about the awareness and defense against malicious events in the Internet of Things must be taken seriously. Eavesdroppers can exploit the shortcomings of the specification and the limited consumption performance of devices to carry out security attacks such as replay attacks. In the process of the over-the-air-activation (OTAA) for LoRa nodes, attackers can modify the data because the data is transmitted in plain text. If the user&rsquo s root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network. To solve this security flaw in LoRaWAN, we propose a countermeasure called Secure-Packet-Transmission scheme (SPT) which works based on the LoRaWAN standard v1.1 to prevent replay attacks when an attacker has obtained the root key. The proposed scheme redefines the format of join-request packet, add the new One Time Password (OTP) encrypted method and changes the transmission strategy in OTAA between LoRa nodes and network server. The security evaluation by using the Burrows-Abadi-Needham logic (BAN Logic) and the Scyther shows that the security goal can be achieved. This paper also conducts extensive experiments by simulations and a testbed to perform feasibility and performance analysis. All results demonstrate that SPT is lightweight, efficient and able to defend against malicious behavior. |
Databáze: | OpenAIRE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |