About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

Selective Jamming of LoRaWAN using Commodity Hardware

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.7-11-2017.2273515,
        author={Emekcan Aras and Nicolas Small and Gowri Ramachandran and St\^{e}phane Delbruel and Wouter Joosen and Danny Hughes},
        title={Selective Jamming of LoRaWAN using Commodity Hardware},
        proceedings={14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={ACM},
        proceedings_a={MOBIQUITOUS},
        year={2018},
        month={4},
        keywords={iot security lpwan lora lorawan},
        doi={10.4108/eai.7-11-2017.2273515}
    }
    
  • Emekcan Aras
    Nicolas Small
    Gowri Ramachandran
    Stéphane Delbruel
    Wouter Joosen
    Danny Hughes
    Year: 2018
    Selective Jamming of LoRaWAN using Commodity Hardware
    MOBIQUITOUS
    ACM
    DOI: 10.4108/eai.7-11-2017.2273515
Emekcan Aras,*, Nicolas Small1, Gowri Ramachandran1, Stéphane Delbruel1, Wouter Joosen1, Danny Hughes1
  • 1: KU Leuven
*Contact email: emekcan.aras@cs.kuleuven.be

Abstract

Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and urgent. This paper highlights security issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow modulation type in the protocol. We exploit these issues to develop a suite of practical attacks based around selective jamming. These attacks are conducted and evaluated using commodity hardware. The paper concludes by suggesting a range of countermeasures that can be used to mitigate the attacks.

Keywords
iot security lpwan lora lorawan
Published
2018-04-18
Publisher
ACM
http://dx.doi.org/10.4108/eai.7-11-2017.2273515
Copyright © 2017–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL