WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi
{"title":"Protecting end-device from replay attack on LoRaWAN","authors":"WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi","doi":"10.23919/ICACT.2018.8323683","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a method to protect end-device by using RSSI and Hand-Shaking technique using Proprietary Message. One of the frequently used attacks in LoRaWAN is replay attack. It is so easy to sniff packets in a wireless network environment. If an attacker intrudes a service provided by LoRaWAN, the usage pattern of the end-device may be exposed, or a replay attack may cause a problem in connection with the user. To prevent replay attack, LoRaWAN standard uses user identification method by using the value known as DevNonce, but this is not a complete countermeasure. In order to complement these vulnerabilities, we propose a method to protect users by using the physical characteristics of a network called RSSI and a new technique called Proprietary Hand-Shaking.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 20th International Conference on Advanced Communication Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT.2018.8323683","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
In this paper, we propose a method to protect end-device by using RSSI and Hand-Shaking technique using Proprietary Message. One of the frequently used attacks in LoRaWAN is replay attack. It is so easy to sniff packets in a wireless network environment. If an attacker intrudes a service provided by LoRaWAN, the usage pattern of the end-device may be exposed, or a replay attack may cause a problem in connection with the user. To prevent replay attack, LoRaWAN standard uses user identification method by using the value known as DevNonce, but this is not a complete countermeasure. In order to complement these vulnerabilities, we propose a method to protect users by using the physical characteristics of a network called RSSI and a new technique called Proprietary Hand-Shaking.