LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review
As LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security. In particular, physical layer topics become relevant to improve the security of LoRaWAN nodes, which are often limited in terms of computational pow...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-04-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/22/9/3127 |
_version_ | 1827671501552222208 |
---|---|
author | Henri Ruotsalainen Guanxiong Shen Junqing Zhang Radek Fujdiak |
author_facet | Henri Ruotsalainen Guanxiong Shen Junqing Zhang Radek Fujdiak |
author_sort | Henri Ruotsalainen |
collection | DOAJ |
description | As LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security. In particular, physical layer topics become relevant to improve the security of LoRaWAN nodes, which are often limited in terms of computational power and communication resources. To this end, e.g., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access. Further, wireless physical layer techniques have potential to enhance key refreshment and device authentication. In this work, we aim to provide a comprehensive review of various vulnerabilities, countermeasures and security enhancing features concerning the LoRaWAN physical layer. Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions. |
first_indexed | 2024-03-10T03:42:49Z |
format | Article |
id | doaj.art-3939753c02864fd18656017a9573ea5d |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T03:42:49Z |
publishDate | 2022-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-3939753c02864fd18656017a9573ea5d2023-11-23T09:13:50ZengMDPI AGSensors1424-82202022-04-01229312710.3390/s22093127LoRaWAN Physical Layer-Based Attacks and Countermeasures, A ReviewHenri Ruotsalainen0Guanxiong Shen1Junqing Zhang2Radek Fujdiak3Institute of IT Security Research, St. Pölten University of Applied Sciences, Campus-Platz 1, 3100 St. Pölten, AustriaDepartment of Electrical Engineering and Electronics, University of Liverpool, Liverpool L69 3GJ, UKDepartment of Electrical Engineering and Electronics, University of Liverpool, Liverpool L69 3GJ, UKDepartment of Telecommunications, Brno University of Technology, Technicka 12, 61600 Brno, Czech RepublicAs LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security. In particular, physical layer topics become relevant to improve the security of LoRaWAN nodes, which are often limited in terms of computational power and communication resources. To this end, e.g., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access. Further, wireless physical layer techniques have potential to enhance key refreshment and device authentication. In this work, we aim to provide a comprehensive review of various vulnerabilities, countermeasures and security enhancing features concerning the LoRaWAN physical layer. Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions.https://www.mdpi.com/1424-8220/22/9/3127LoRaWANvulnerabilitiessecurityphysical layerhardware security |
spellingShingle | Henri Ruotsalainen Guanxiong Shen Junqing Zhang Radek Fujdiak LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review Sensors LoRaWAN vulnerabilities security physical layer hardware security |
title | LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review |
title_full | LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review |
title_fullStr | LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review |
title_full_unstemmed | LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review |
title_short | LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review |
title_sort | lorawan physical layer based attacks and countermeasures a review |
topic | LoRaWAN vulnerabilities security physical layer hardware security |
url | https://www.mdpi.com/1424-8220/22/9/3127 |
work_keys_str_mv | AT henriruotsalainen lorawanphysicallayerbasedattacksandcountermeasuresareview AT guanxiongshen lorawanphysicallayerbasedattacksandcountermeasuresareview AT junqingzhang lorawanphysicallayerbasedattacksandcountermeasuresareview AT radekfujdiak lorawanphysicallayerbasedattacksandcountermeasuresareview |