Security issues in internet of things: Vulnerability analysis of LoRaWAN, sigfox and NB-IoT

Florian Laurentiu Coman, Krzysztof Mateusz Malarski, Martin Nordal Petersen, Sarah Renée Ruepp

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    2572 Downloads (Pure)

    Abstract

    One of the key enablers of an increased Internet of Things (IoT) roll-out is Low-Power Wide Area Network (LP-WAN) - a family of technologies tailored for resilient and energy-efficient communication of thousands of devices over large distances (even up to 100km). Under the pressure from both the business and the society to provide ubiquitous connectivity as soon as possible, new IoT deployments are conducted with haste and often by inexperienced people. Consequently, the aspect of communication security traditionally remains a secondary matter, even though the potential harm of a successful hacker attack can be enormous. Therefore, this paper presents an analysis of LP-WAN vulnerabilities, as well as several Proof-of-Concept (PoC) attacks toward LoRaWAN (packet forging), Sigfox (replay with DoS) and NB-IoT (attack using malicious UE), that confirm the existence of the vulnerabilities in both the standards and off-the-shelf hardware and services.
    Original languageEnglish
    Title of host publicationProceedings of 3rd Global IoT Summit
    Number of pages6
    PublisherIEEE
    Publication date2019
    Article number8766430
    ISBN (Print)9781728121710
    DOIs
    Publication statusPublished - 2019
    Event2019 Global IoT Summit - Aarhus, Denmark
    Duration: 17 Jun 201921 Jun 2019

    Conference

    Conference2019 Global IoT Summit
    Country/TerritoryDenmark
    CityAarhus
    Period17/06/201921/06/2019

    Keywords

    • Security
    • NB-IoT
    • LoRaWAN
    • Sigfox
    • Vulnerability
    • LP-WAN

    Fingerprint

    Dive into the research topics of 'Security issues in internet of things: Vulnerability analysis of LoRaWAN, sigfox and NB-IoT'. Together they form a unique fingerprint.

    Cite this