=Paper=
{{Paper
|id=Vol-3789/Paper1
|storemode=property
|title=IoT using LoRaWAN: a Security Analysis
|pdfUrl=https://ceur-ws.org/Vol-3789/Paper1.pdf
|volume=Vol-3789
|authors=Anne-Carole Honfoga,Michel Dossou,Véronique Moeyaert
|dblpUrl=https://dblp.org/rec/conf/cita2/HonfogaDM24
}}
==IoT using LoRaWAN: a Security Analysis==
IoT using LoRaWAN: a security analysis⋆ Anne-Carole Honfoga1,2,∗,† , Michel Dossou2,† and Véronique Moeyaert1,† 1 Electromagnetism and Telecommunications Department, Faculty of Engineering (FPMs), University of Mons, Mons, Belgium 2 Research unit in photonics and wireless communications, LETIA/EPAC University of Abomey-Calavi, Abomey-Calavi, Benin Abstract Internet of Things (IoT) refers to the process of connecting cyber-physical objects to the Internet, enabling the exchange of data over wireless communication networks with limited human intervention. These communication networks use licensed spectrum or unlicensed spectrum. Instead of licenced spectrum used by Narrowband Internet of things (NB-IoT) and Long-Term Evolution for Machines (LTE-M), SigFox, MIoTy, and Long Range Wireless Area Network (LoRaWAN) employ unlicenced spectrum for communication between the network entities. Among wireless networks using unlicensed spectrum, LoRaWAN is the most used network in many applications (smart farming, smart building, smart metering) but its presents several vulnerabilities. This paper studies the LoRaWAN threats, malicious attacks and mitigation against attacks. Keywords IoT, LoRa, LoRaWAN, Network Security, Vulnerability, Attack 1. Introduction These advantages allow LoRaWAN to be considered as the technology that is improving the operations of many in- Internet of Things (IoT) is an essential element that has dustrial sectors (e.g. agriculture, environment) as a large- revolutionized the Information and Communication Tech- scale remote monitoring is then possible. However, like nology sector (ICT). Over the past decade, it has been the any computer network, and particularly wireless network, focus of much academic and industrial interest, with the this technology suffers from many security problems that purpose of making buildings, cities, agriculture and envi- can be defined following the three security criteria: avail- ronment smart. This technology refers to the process of ability, integrity and confidentiality. Many specifications of connecting cyberphysical objects (machines) to the Inter- LoRaWAN have been published since its development by net, enabling the exchange (sending and receiving) of data Semtech Corporation [2]. The security of these technologies over wireless communication networks with limited human has been improved with the specification version. Indeed, intervention. These machines are embedded devices which the first version presents more vulnerabilities than the latest present characteristics such as a low energy consumption, version 1.1. a low computing power, a small size, a small price and a This paper reviews LoRaWAN attacks, vulnerabilities and capacity to communicate within a wireless network. There security measures. It provides a short review and an analy- are many wireless communication networks classified in sis of LoRaWAN robustness and gives perspectives about terms of energy consumption and communication range. In the robustness improvement. The outline of the paper is pre- terms of energy consumption, they can be divided into low sented as follows: the theoretical background is described power communication (NFC – Near Field Communication, (§II), the literature review is presented (§III), the paper is RFID – Radio Frequency Identifier, Z-Wave, Zigbee, BLE finalized by the conclusion (§IV). – Bluetooth Low Energy, LTE-M – Long Term Evolution- Machine, NB-IoT – Narrowband IoT, SigFox and LoRaWAN) and high-power communication technologies (Bluetooth, 2. Theoretical background Wi-Fi – Wireless Fidelity, 3G, 4G and 5G). Regarding the communication coverage, there are short range communi- 2.1. Introduction to LoRaWAN cation networks (< 1km) (e.g. NFC, RFID, Wi-Fi, Bluetooth, Before explaining the behaviour of LoRaWAN protocol, let BLE, Z-Wave and Zigbee) and long-range communication us compare LoRaWAN to the LoRa (Long Range) modula- networks (1-15 km) (3G, 4G, 5G, LTE-M, NB-IoT, Sigfox, and tion. LoRa is the modulation type used between two LoRa LoRaWAN) [1]. devices or between a LoRa device and a gateway (cf Fig. LoRaWAN is a low cost, low power and long-range com- 1). The LoRaWAN term is employed when end-devices can munication network that is developed to fill a gap in IoT communicate with the LoRaWAN servers. LoRaWAN is the communications. Using this technology belonging to Low extended version of LoRa technology which connects end- Power Wide Area Networks (LPWAN), sensors or actuators devices to the network server. It includes LoRa modulation can send signals over 5 km in urban areas and up to 15 km that operates at the physical layer of the network. Fig. 1 in sub-urban areas. Instead of licenced spectrum used by shows the LoRaWAN topology. LoRaWAN’s main competitors (a.k.a other LPWANs) like LoRaWAN network includes three sub networks. There NB-IoT and LTE-M, LoRaWAN employs unlicenced spec- is the LoRa radio frequency network presenting a star topol- trum for communication between the network entities [1]. ogy, the backhaul network connecting Gateways and Net- Cotonou’24: Conférence Internationale des Technologies de l’Information work Servers using Mesh topology or partial Mesh topology et de la Communication de l’ANSALB, June 27–28, 2024, Cotonou, BENIN and the backhaul network connecting Network Servers with ⋆ You can use this document as the template for preparing your publica- Join and Application Servers. Beside the two servers (Net- tion. We recommend using the latest version of the ceurart style. work Server and Application Server) used in LoRaWAN ∗ Corresponding author. † v1.0, a new server called Join Server is added in LoRaWAN These authors contributed equally. Envelope-Open anne-carole.honfoga@umons.ac.be (A. Honfoga) v1.1 to manage the OTAA (Over the Air Activation) pro- Orcid 0000-0002-0550-2611 (A. Honfoga) cedure more securely. The Join Server has been added in © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). the network to orchestrate in a more secure way the join- CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings Table 1 Comparison of end-devices activation procedures OTAA ABP End-device companies The commissioning pro- generate fundamental cess is simplified and then provisioning parameters. less secure. Secure keys can be re- End-devices and Keys are freshed regulary. Then customized during manu- high-level, tamper-proof facturing. Figure 1: Network architecture of LoRaWAN v1.1 [3] security options are acces- sible. End devices can stock var- End-devices become di- ing procedure used by end-devices (LoRa devices) to join ious ”identities” to change rectly operational upon the network. Also, LoRaWAN v1.1 integrated roaming and network and operator dy- powering up. mobility techniques for the end-devices by employing extra namically and securely over their lifetime. servers called Join Server (JS), forwarding Network Server (fNS), serving Network Server (sNS). 2.1.2. Device classes: A, B and C 2.1.1. End-devices joining procedures Three kinds of operation for devices are defined in Lo- The joining procedure creates mutual authentication be- RaWAN: class A, class B, and class C. All end-devices must tween an end-device and the LoRaWAN network to which support class A operation. class A device can not receive it is linked. Two joining procedures are used to connect signal from the gateway if an uplink transmission has not the end-devices to the servers. There are Activation By Per- been yet transmitted. It represents the device class in which sonalization (ABP) and Over-The-Air Activation (OTAA). the end-device spends more time in sleep mode. Only two Among them, OTAA procedure is the more secure. It pro- receive windows are scheduled for down-link messages re- vides a more flexible and secure way to establish session ception. Class B device can be regularly joined without a keys with the network servers. In OTAA, authentication previous uplink transmission. It offers regularly-scheduled, is required for devices using two different keys for each fixed-time opportunities for an end-device to receive down- device that are generated each time the device joins the link messages from the gateways, allowing class B end- network: Network session Key (NwkSKey) and the Appli- devices convenient for sensors and actuators monitoring. cation session Key (AppSKey). Using two different keys Class C device can always be joined. It is always listening makes it is more difficult to tamper with or read application for downlink messages, unless they are transmitting uplink data, even if one of the keys has been compromised. These messages. Like class A device, class C device implements keys are generated during the two root keys (NwkKey and the same two receive windows, but it does not close the sec- AppKey) design. The ABP procedure is not so secure as the ond reception window until it sends the next transmission end-devices are directly connected to the network without back to the network server. The class C device is a power join request and join-accept procedures [1]. Indeed, instead consuming device compared to the class B device which in of key generation during each section, the Network section turn consumes more energy than the class A device [1] (cf Key and the App section Key are directly defined and stored Fig. 2). in the device. This ABP method presents vulnerabilities. By modifying these keys, communications between the device, the gateway and the network server can be seen or inter- cepted by anyone if the device is connected to the gateway and Network Server. Let us note that the Network section Key and the Application section Key are generated using the same root Key in LoRaWAN v1.0 whereas in LoRaWAN v1.1 the application root key is different from the Network root key. The AppKey and NwkKey are generated using the AES-128-bit encryption method. These keys are spe- cific to each end-device and embedded into the end-device during its fabrication. A Message Integrity Code (MIC) is computed once the encryption is done and is calculated over all the Message Authentication Code (MAC). It ensures the integrity of the message. MAC is used to check the mes- sages and the authentication, ensuring that the integrity of Figure 2: Power consumption and downlink capabilities [1] the data has not been altered during transmission. The in- tegrity is protected hop-by-hop. LoRaWAN exploits various methods for generating the MIC depending on the direction of the message, uplink, or downlink [4]. The MIC check 2.2. Security Analysis is performed on the data to avoid data tampering without LoRaWAN security challenges are related to different parts the Network section key (NwkSKey). Table 1 presents the of the network. The main parts are the network entities comparison of OTAA and ABP procedures. (gateways, servers, and end-devices), the key distribution methods, the network implementation, and the roaming techniques integrated in LoRaWAN v1.1, and the backward the message, this vulnerability is used to employ a compatibility challenges. In this section, LoRaWAN vulner- wormhole attack. abilities and attacks are presented. • Coexistence problem of LoRa LoRa transmission is sensible to interference issues 2.2.1. LoRaWAN vulnerabilities such as interference from Cellular Networks (Global System for Mobile Communications (GSM), Univer- Network security vulnerabilities are weaknesses within the sal Mobile Telecommunications System (UMTS), and system’s software, hardware, or organizational processes. Long Term Evolution (LTE)) (which can make less Their can be either non-physical or physical. The main sensitive LoRa receivers, making it hard to receive vulnerabilities of LoRaWAN are: the long times communica- weak signals) and In-Band and Out-of-Band inter- tion induced by Long Range transmission, the coexistence ference [5]. In-band interference occurs when other problem of LoRa, and backward compatibility challenges. devices operate on the same or adjacent channels, • Long times communication induced by Long while out-of-band interference comes from strong Range transmission signals outside the useful band. When LoRa trans- Spreading Factor (SF) is a parameter used in spread missions are performed at the same frequency using spectrum modulation techniques like Long Range the same spreading factor in the same area (In-Band (LoRa) modulation, to control the spreading of a sig- interference), they can interfere with each other. nal over a wider bandwidth. The larger SF is, the This LoRa physical Layer vulnerability can be ex- longer the distance the device can receive or trans- ploited for jamming attack as this transmission is mit. Eight Spreading Factor (SF5, SF6, SF7, SF8, SF9, performed using unlicensed spectrum. SF10, SF11 and SF12) are used in LoRa transmissions • Backward compatibility challenges whereas in LoRaWAN six SF are used (SF7 to SF12). Backward compatibility problems occur when a The elapsed time on air of a LoRaWAN messages newer version of a software or hardware system is increases with the Spreading Factor (SF) and then not able to work with the data or functionality of an the transmission distance. Indeed, the time on air in- older version. In LoRaWAN security case, LoRaWAN creases with the symbol transmission time (𝑇𝑠𝑦𝑚𝑏𝑜𝑙 ) v1.1 aims to improve security, but it may be difficult (1). The symbol transmission time is defined by to ensure backward compatibility with devices using the formula (2). For a fixed bandwidth, the symbol earlier versions (v1.0). In fact, the Network Server is transmission time increases with the spreading fac- responsible for deciding which protocol version to tor value (cf Fig. 3). In particular, symbol duration exploit and chooses the highest common version be- increases by a factor of 2 from one SF to the next. As tween itself and the End-Device (ED). As LoRaWAN shown on this figure, the start frequency (low fre- v1.0 presents more security weaknesses than Lo- quency) is the channel frequency (center frequency) RaWAN v1.1, the backward compatibility offered by minus the channel bandwidth divided by two. The the evolved version could constitute a vulnerability. final frequency (high frequency) is the channel fre- quency plus the channel bandwidth divided by two. 2.2.2. LoRaWAN attacks • Jamming attack 𝑇 𝑖𝑚𝑒 − 𝑜𝑛 − 𝐴𝑖𝑟 = 𝑛𝑠𝑦𝑚𝑏𝑜𝑙 × 𝑇𝑠𝑦𝑚𝑏𝑜𝑙 (1) Radio Jamming attack consists in disrupting the LoRa radio transmission by transmitting a powerful 2𝑆𝐹 radio signal in the proximity of application devices. 𝑇𝑠𝑦𝑚𝑏𝑜𝑙 = (2) 𝐵𝑎𝑛𝑑𝑤𝑖𝑑𝑡ℎ It is possible to jam LoRa messages using well timed malicious transmissions. This attack is usually per- formed using a dedicated hardware (ie Commercial- off-the-shelf (COTS)) to jam LoRa devices. There are no real countermeasures to prevent this attack. But network administrators can easily detect jamming when devices transmitting into the network start to disappear. They may then decide to switch to another frequency in the band to avoid the impact of jamming. • Selective jamming attack Selective jamming constitutes the most sophisticated and efficient jamming technique which could be ef- fective using a COTS hardware by extending the Figure 3: Symbol transmission time [1] jammer with additional software to target a specific device address [2]. Selective jamming only jams selected devices or messages. As other devices or As high SF (up to SF12) is required for the network messages on the network are not jammed, it can edge end-devices to communicate with the gateway, be much more difficult for the network operator a mock device can intercept messages or falsify pack- or administrator to decide whether an ED is being ets intended for the gateway. Furthermore, there is jammed, or whether some other technical problem no time-related information in LoRaWAN packet. has occurred. Then, the countermeasures available As LoRaWAN packet structure does not include any for the classical jamming attack are not possible in time-based signature or data to validate the time of the case of selective jamming attack. • Replay attack The payload encryption is handled by the Applica- Replay attack is performed on security protocol by tion Server, while the MIC is checked and terminated repeating the available data transmitted by malicious by the infrastructure provider (Network Server (NS)) entity Fig. 4). Replay attack is an attack on the se- [6]. Then, between the infrastructure provider’s net- curity protocol that consists in resending captured work server and the IoT solution provider’s Applica- messages from the end-devices. Its objective is in tion Server (AS), the content can not be checked for the Denial of Service of an end-device This attack is integrity and authenticity. An attacker can attempt possible using the communication frequencies and to intercept anywhere between the NS and the AS. channels to sniff data from transmission between This attack can be achieved through a variety of devices (end-devices and Gateways). Predator may approaches, ranging from routing-based approach, intercept and replay legitimate messages, compro- such as Border Gateway Protocol (BGP) Route hi- mising the network’s security. The use of frame jacking or IP source routing, to physical and link counters process helps LoRaWAN network to know layer-based ones, such as a compromised device on if the message is sent by the gateway instead of a the path [7]. This attack consists in the illegitimate malicious device. Indeed, once the end-device is ac- takeover of groups of IP addresses by corrupting tivated, both frame counters (from the end-device Internet routing tables maintained using BGP proto- and the gateway) are set to 0, and each message col. coming from the gateway, or the device increments • Rogue gateway attack the counters. By this way, if a message is received LoRaWAN gateways are obeying relays and then with a lower frame counter than the last message, constitute the weakest link of the network. Any it is ignored. But this process could be exploited by kind of security problem on this node would inter- attackers to produce a Denial of Service. rupt communication between the end-devices and the servers. One of the attacks faced by LoRaWAN gateways is the use of a rogue gateway that acts like as a legitimate gateway. One can distinguish two kind of attacks: LoRa class B attack (beacon synchronization Denial of Service (DoS) attack) and Impersonation attack. – Beacon synchronization DoS attack This attack is a typical malicious gateway attack that use class B device vulnerability. In LoRaWAN, class B beacons received in downlink transmission are not secured by any methods, indicating that an attacker can Figure 4: Attack replay deploy a malicious gateway to send counter- feit beacons. The result is that class B end- devices will receive messages in windows out- • Wormhole attacks of-sync with the malicious gateway. By send- A wormhole attack is an attack which can be per- ing out beacons randomly a malicious gate- formed against a LoRaWAN network. This attack way could desynchronize an end device from consists in packet sniffing and replaying them. One receiving windows of another gateway. This malicious device captures the packets from one de- could cause a denial of service, as the legiti- vice and transmits them to another distant located mate gateway sends messages when the end device to replay the captured packet. The two de- device is not receiving. To deal with this at- vices which participate to this attack are the sniffer tack, a key should be exploited by gateways and the jammer. The sniffer captures packets and, to authenticate beacons communications. transmits signal to the jammer informing that it ap- – Impersonation attack prehended the packet [2]. By this way, the packet Gateways can also be impersonated to create does not reach the gateway and is still active for attacks against end-devices. End-devices can validation. This packet could be forwarded to the be listened to and their network address can gateway at any time as there is no time related in- be determined. Furthermore, a triangulation formation in LoRaWAN messages. method (minimum 3 gateways are required in • Eavesdropping this case to perform the intended capturing As already presented, LoRaWAN implements chan- attack the end-device). nel confidentiality through AES in counter mode, Besides the attacks previously presented, there are where the block counter value is exploited as an in- also network spoofing attack, selective forwarding put. During a counter reset, the key will remain in attack, sinkhole or blackhole attack ... In the follow- place, meaning that the block cipher will reconsti- ing section, a short literature review of papers about tute the same key material. An attacker can exploit LoRaWAN security is presented. this comportment to decrypt messages. • Bit-Flipping Attack (Man-in-the-Middle, MitM) LoRaWAN messages are encrypted and carry a MIC. 3. Literature review But the encryption and the integrity check are man- aged at different locations inside a message frame. Table 2 presents a literature review on papers related to LoRaWAN security. Table 2 4. Conclusion Paper summary This paper presents a security analysis of LoRaWAN v1.1. Ref Objectives Summary of con- Results The main vulnerabilities and attacks are summarized. It (Year) cept gives a review on papers that address this network security. It is shown that the main physical layer security attacks are [2] Analysis of po- LoRa transmis- A COTS device (2017) tential security sions are prone to is used for jam- jamming and attack replay while other attacks can affect weaknesses selective jamming ming test. the network availability, integrity and confidentiality. in LoRa. The (with a commer- network stack cial off-the-shelf is analysed hardware) attacks, 5. Acknowledgments and ED vul- replay attack and nerabilities are wormhole attack. This work has been carried out under support from the presented. ARES within the frame of a post-doctoral mobility grant in the Electromagnetism and Telecommunications Service [3] Analysis of the It presents a These prob- (UMONS/FPMs/Belgium). (2019) security risk related work on lems affect of LoRaWAN security risk of the network v1.1 by pre- senting the LoRaWAN v1.0. It also highlights availability, the data integrity References main security security vulnerabil- and confiden- [1] S. Montagny, LoRa-LoRaWAN and internet of things improvement ities of LoRaWAN tiality, and for beginners, Available: www. univ-smb. fr/lorawan compared to v1.1., possible mechanisms are LoRaWAN v1.0. attacks and de- proposed. (2021). fense mechanisms [2] E. Aras, G. S. Ramachandran, P. Lawrence, D. Hughes, against these Exploring the security vulnerabilities of LoRa, in: 2017 attacks 3rd IEEE international conference on cybernetics (CYB- CONF), IEEE, 2017, pp. 1–6. [7] Analysis of the Description of Lo- Main attack: (2019) practical capac- RaWAN v1.1 from Class B syn- [3] I. Butun, N. Pereira, M. Gidlund, Security risk analysis ity of LoRaWAN the joining proce- chronization of LoRaWAN and future directions, Future Internet 11 and its security dure handling to attack (Beacon (2018) 3. challenges. the keys manage- transmission by [4] H. Noura, T. Hatoum, O. Salman, J.-P. Yaacoub, ment, attacks, and attackers) and A. Chehab, LoRaWAN security survey: Issues, threats network capacity Jamming and possible mitigation techniques, Internet of Things [8] Analysis of Description of Main attacks: 12 (2020) 100303. (2020) LoRaWAN v1.1 LoRaWAN about confidentiality [5] K. Michel Gilbert, LoRaWAN gateways: Radio coexis- security by data and control (session key tence issues and solutions, LoRa Alliance (2021). comparing its packet types, Reuse), integrity [6] F. Kuntke, V. Romanenko, S. Linsner, E. Steinbrink, vulnerabilities identifiers and (bit flipping and C. Reuter, LoRaWAN security issues and mitigation to those of keys management ACK spoofing), options by the example of agricultural iot scenarios, LoRaWAN v1.0 (1.0 vs 1.1), ED availability Transactions on Emerging Telecommunications Tech- joining procedure), (class B desyn- nologies 33 (2022) e4452. and PHY attacks chronization), [7] M. Santamaria, A. Marchiori, Demystifying LoRaWAN (continuous, selec- authentication tive or triggered (MiTM). security and capacity, in: 2019 29th International jamming) Telecommunication Networks and Applications Con- ference (ITNAC), IEEE, 2019, pp. 1–7. [4] Comprehen- Classification of Matching of [8] S. J. Philip, J. M. McQuillan, O. Adegbite, LoRaWAN (2020) sive analysis LoRaWAN threat threats to each v1. 1 security: Are we in the clear yet?, in: 2020 IEEE of LoRaWAN regarding secu- attack and miti- versions (1.0.1, rity criteria such gation measures 6th International Conference on Dependability in Sen- 1.0.2, 1.1, 1.0.3) as availability, LoRaWAN v1.1 sor, Cloud and Big Data Systems and Application (De- regarding ED, authentication, security com- pendSys), IEEE, 2020, pp. 112–118. LoRaWAN lay- integrity and parison to 1.0.2 [9] T. Perković, H. Rudeš, S. Damjanović, A. Nakić, Low- ers, hardware confidentiality and vulnerabilities cost implementation of reactive jammer on LoRaWAN and operating analysis of the risk network, Electronics 10 (2021) 864. systems. degree of them. [9] Implementation Reactive jamming A low-cost (2021) of three forms using Channel commodity of reactive jam- Activity Detection hardware based ming attack and (CAD) mechanism on Arduino countermea- detection, using platform can sures for attack a combination of be used by mitigation channel hopping attackers to and transmission, completely and using CAD interrupt the detection, channel network hopping and trans- mission