Protecting Gateway from ABP Replay Attack on LoRaWAN

This paper discusses the problem of replay attacks with the ABP (Activation By Personalisation) authentication method on the LoRaWAN infrastructure and proposes effective gateway protection. To solve the problem, an experiment is replicated that simulates the attacker and is embedded in a real infrastructure environment. Subsequently, a detector is proposed and implemented based on knowledge of attacker’s steps. The paper brings a proposed and verified detection algorithm that is implemented directly on the gate with an attack incident report. The aim of this approach is to prevent server-side spoofing and dosing attack on the end-device.

[1]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[2]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[3]  Stefano Tomasin,et al.  Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[4]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[5]  Seong-Gon Choi,et al.  Protecting end-device from replay attack on LoRaWAN , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[6]  Ki-Hyung Kim,et al.  Scenario and countermeasure for replay attack using join request messages in LoRaWAN , 2017, 2017 International Conference on Information Networking (ICOIN).

[7]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[8]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.