14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

Selective Jamming of LoRaWAN using Commodity Hardware

  • @INPROCEEDINGS{10.4108/eai.7-11-2017.2273515,
        author={Emekcan Aras and Nicolas Small and Gowri Ramachandran and St\^{e}phane Delbruel and Wouter Joosen and Danny Hughes},
        title={Selective Jamming of LoRaWAN using Commodity Hardware},
        proceedings={14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={ACM},
        proceedings_a={MOBIQUITOUS},
        year={2018},
        month={4},
        keywords={iot security lpwan lora lorawan},
        doi={10.4108/eai.7-11-2017.2273515}
    }
    
  • Emekcan Aras
    Nicolas Small
    Gowri Ramachandran
    Stéphane Delbruel
    Wouter Joosen
    Danny Hughes
    Year: 2018
    Selective Jamming of LoRaWAN using Commodity Hardware
    MOBIQUITOUS
    ACM
    DOI: 10.4108/eai.7-11-2017.2273515
Emekcan Aras,*, Nicolas Small1, Gowri Ramachandran1, Stéphane Delbruel1, Wouter Joosen1, Danny Hughes1
  • 1: KU Leuven
*Contact email: emekcan.aras@cs.kuleuven.be

Abstract

Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and urgent. This paper highlights security issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow modulation type in the protocol. We exploit these issues to develop a suite of practical attacks based around selective jamming. These attacks are conducted and evaluated using commodity hardware. The paper concludes by suggesting a range of countermeasures that can be used to mitigate the attacks.