Development and Testing of a Real-Time LoRawan Sniffer Based on GNU-Radio

This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protoco...

Full description

Bibliographic Details
Main Authors: Andrés F. Bravo-Montoya, Jefersson S. Rondón-Sanabria, Elvis E. Gaona-García
Format: Article
Language:English
Published: Instituto Tecnológico Metropolitano 2019-09-01
Series:TecnoLógicas
Subjects:
Online Access:https://revistas.itm.edu.co/index.php/tecnologicas/article/view/1491
Description
Summary:This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.
ISSN:0123-7799
2256-5337