Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure

LoRaWAN is a Low Power Wide Area Network (LPWAN) protocol designed to allow low power battery operated nodes to communicate with each other. Though LoRaWAN provides end-to-end security, however vulnerabilities exist in the security mechanism of LoRaWAN join procedure. A jammer can be used to launch a denial of service (DOS) attack by permanently disconnecting the LoRa end nodes from the LoRaWAN network. In this paper, we propose a novel LoRaWAN based Intrusion Detection System (LIDS) for jamming attacks. A real experimental testbed is developed and deployed and LIDS is trained on real join request data. We propose two LIDS algorithms based on Kullback Leibler Divergence (KLD) and Hamming distance (HD). The algorithms are extensively tested on realworld dataset. Receiver Operating Characteristic (ROC) based performance evaluations show that KLD and HD can achieve detection rates as high as 98% and 88% respectively with 5% false positive rate.

[1]  Ki-Hyung Kim,et al.  Risk analysis and countermeasure for bit-flipping attack in LoRaWAN , 2017, 2017 International Conference on Information Networking (ICOIN).

[2]  Ki-Hyung Kim,et al.  Scenario and countermeasure for replay attack using join request messages in LoRaWAN , 2017, 2017 International Conference on Information Networking (ICOIN).

[3]  Da-Xin Tian,et al.  ANNIDS: intrusion detection system based on artificial neural network , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).

[4]  Stefano Tomasin,et al.  Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[7]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[8]  Jun Lin,et al.  Using Blockchain Technology to Build Trust in Sharing LoRaWAN IoT , 2017, ICCSE'17.

[9]  John Kelsey,et al.  Recommendation for the Entropy Sources Used for Random Bit Generation , 2018 .

[10]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[11]  Leila Azouz Saidane,et al.  Enhancing the security of the IoT LoraWAN architecture , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).