Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions

The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to new transmission technologies to satisfy the requirements of diverse IoT applications. Low powered wide area networks (LPWAN) is one of those transmission technologies, and is becoming exceptionally useful for IoT applications. The nodes use energy-efficient mechanisms for long-range data transmission (10–20 km), lasting in hostile environments for years and making them suitable for IoT applications such as environmental monitoring, automated billing systems, smart homes, smart offices, and patient monitoring. However, LPWAN devices have minimal resources, which makes it challenging to provide promising security to devices and data in the network. In this paper, we discuss the security mechanisms used in current LPWAN technologies along with their vulnerabilities and possible attacks on them. A detailed literature review is conducted on existing solutions on the security of constrained IoT networks similar to LPWAN using different networking frameworks. The reviewed literature is then compared based on various network security measures addressed by them. In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature. Finally, the applicability of SDN in LPWAN security, its opportunities, and challenges in implementation are discussed.

[1]  Georges Kaddoum,et al.  A Survey on Intelligent MAC Layer Jamming Attacks and Countermeasures in WSNs , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[2]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[3]  Soo Young Shin,et al.  Swapped Huffman tree coding application for low-power wide-area network (LPWAN) , 2016, 2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS).

[4]  Rob Enns,et al.  NETCONF Configuration Protocol , 2006, RFC.

[5]  Qi Zhang,et al.  An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security , 2020, IEEE Transactions on Services Computing.

[6]  Kevin W. Sowerby,et al.  Robustness of radiometric fingerprinting in the presence of an impersonator , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[7]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[8]  Xueying Yang LoRaWAN: Vulnerability Analysis and Practical Expoitation , 2017 .

[9]  Joanna Domanska,et al.  Self-Aware Networks That Optimize Security, QoS, and Energy , 2020, Proceedings of the IEEE.

[10]  Sarah Ruepp,et al.  Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT , 2019, 2019 Global IoT Summit (GIoTS).

[11]  Xin Huang,et al.  S2Net: A Security Framework for Software Defined Intelligent Building Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[12]  Sheikh Ariful Islam,et al.  Machine Learning Based IoT Edge Node Security Attack and Countermeasures , 2019, 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).

[13]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[14]  Sujata Banerjee,et al.  SDN and OpenFlow Evolution: A Standards Perspective , 2014, Computer.

[15]  Mianxiong Dong,et al.  A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities , 2016, IEEE Access.

[16]  Deqing Zou,et al.  Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms , 2020, Comput. Networks.

[17]  Shadab Alam,et al.  Security Threats, Attacks, and Possible Countermeasures in Internet of Things , 2020 .

[18]  Ellen W. Zegura,et al.  An architecture for active networking , 1997, HPN.

[19]  Miklós Kozlovszky,et al.  Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands , 2018, 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI).

[20]  Kun-Lin Tsai,et al.  TTP Based High-Efficient Multi-Key Exchange Protocol , 2016, IEEE Access.

[21]  Martín Casado,et al.  Ethane: taking control of the enterprise , 2007, SIGCOMM '07.

[22]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[23]  Chunhua Jin,et al.  Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.

[24]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[25]  Marwa Qaraqe,et al.  Applications of Artificial Intelligence and Machine Learning in the Area of SDN and NFV: A Survey , 2019, 2019 16th International Multi-Conference on Systems, Signals & Devices (SSD).

[26]  Jong Min Kim,et al.  Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.

[27]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[28]  Anne Fladenmuller,et al.  Self-configuration mechanisms for SDN deployment in Wireless Mesh Networks , 2017, 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[29]  Fernando A. Kuipers,et al.  Security Vulnerabilities in LoRaWAN , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).

[30]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[31]  Denny Darlis,et al.  An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).

[32]  Antonio Skarmeta,et al.  Security Management Architecture for NFV/SDN-Aware IoT Systems , 2019, IEEE Internet of Things Journal.

[33]  Antonio F. Gómez-Skarmeta,et al.  Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach , 2018, Sensors.

[34]  Fang Liu,et al.  Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[35]  Adnan M. Abu-Mahfouz,et al.  Utilising artificial intelligence in software defined wireless sensor network , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[36]  Amitava Ghosh,et al.  NB-IoT deployment study for low power wide area cellular IoT , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[37]  Yogita Hande,et al.  A Survey on Intrusion Detection System for Software Defined Networks (SDN) , 2020, Int. J. Bus. Data Commun. Netw..

[38]  Petr Dolezel,et al.  Industrial Network Protection by SDN-Based IPS with AI , 2020, ACIIDS.

[39]  Zheng Yan,et al.  Software Defined Intelligent Building , 2015, Int. J. Inf. Secur. Priv..

[40]  Xianglin Wei,et al.  Collaborative mobile jammer tracking in Multi-Hop Wireless Network , 2018, Future Gener. Comput. Syst..

[41]  Utz Roedig,et al.  LoRa for the Internet of Things , 2016, EWSN.

[42]  Lei Wang,et al.  QoE Oriented Cognitive Network Based on Machine Learning and SDN , 2019, 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN).

[43]  Leila Azouz Saidane,et al.  Enhancing the security of the IoT LoraWAN architecture , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).

[44]  M. Shamim Hossain,et al.  A software defined network routing in wireless multihop network , 2017, J. Netw. Comput. Appl..

[45]  Junqing Zhang,et al.  Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Networks , 2020, IEEE Internet of Things Journal.

[46]  Jacobus E. van der Merwe,et al.  Switchlets and Dynamic Virtual ATM Networks , 1997, Integrated Network Management.

[47]  Qiao Yan,et al.  Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT , 2019, 2019 Computing, Communications and IoT Applications (ComComAp).

[48]  Arjuna Sathiaseelan,et al.  Software-defined wireless mesh networks for internet access sharing , 2015, Comput. Networks.

[49]  Walid Saad,et al.  Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.

[50]  Md. Zakirul Alam Bhuiyan,et al.  Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN) , 2020, Comput..

[51]  Nouha Oualha,et al.  Lightweight Attribute-Based Encryption for the Internet of Things , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[52]  Susan Hares,et al.  Network Programmability With ForCES , 2015, IEEE Communications Surveys & Tutorials.

[53]  Kwangjo Kim,et al.  Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks , 2016 .

[54]  Raheem Beyah,et al.  GTID: A Technique for Physical Device and Device Type Fingerprinting , 2015, IEEE Transactions on Dependable and Secure Computing.

[55]  Mani Mina,et al.  Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.

[56]  Konstantin Mikhaylov,et al.  On Track of Sigfox Confidentiality with End-to-End Encryption , 2018, ARES.

[57]  Reza Malekian,et al.  Software defined wireless sensor networks application opportunities for efficient network management: A survey , 2017, Comput. Electr. Eng..

[58]  JaeHyu Kim,et al.  A Dual Key-Based Activation Scheme for Secure LoRaWAN , 2017, Wirel. Commun. Mob. Comput..

[59]  Kun-Lin Tsai,et al.  AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments , 2018, IEEE Access.

[60]  Kuan Zhang,et al.  An Improved Secure Key Management Scheme for LoRa System , 2019, 2019 IEEE 19th International Conference on Communication Technology (ICCT).

[61]  S. V. Manisekaran,et al.  An analysis of software-defined routing approach for wireless sensor networks , 2016, Comput. Electr. Eng..

[62]  B. Sieka,et al.  Active fingerprinting of 802.11 devices by timing analysis , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[63]  Daniel W. Engels,et al.  A secure IoT architecture for Smart Cities , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[64]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[65]  Biao Han,et al.  Distributed Physical Layer Key Generation for Secure LPWAN Communication , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).

[66]  Gustavo B. Figueiredo,et al.  Improving QoS and QoE Through Seamless Handoff in Software-Defined IEEE 802.11 Mesh Networks , 2017, IEEE Communications Letters.

[67]  Mahesh Sooriyabandara,et al.  Low Power Wide Area Networks: An Overview , 2016, IEEE Communications Surveys & Tutorials.

[68]  Zhi Chen,et al.  A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..

[69]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[70]  Miroslav Voznak,et al.  Protecting Gateway from ABP Replay Attack on LoRaWAN , 2018 .

[71]  Georgios Kambourakis,et al.  Lightweight algorithm for protecting SDN controller against DDoS attacks , 2017, 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC).

[72]  Youngseop Kim,et al.  An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).

[73]  Nikolaos Scarmeas,et al.  The good, bad, and ugly? , 2012, Neurology.

[74]  Arjen Hommersom,et al.  Denial-of-Service Attacks on LoRaWAN , 2018, ARES.

[75]  Nick Feamster,et al.  Improving network management with software defined networking , 2013, IEEE Commun. Mag..

[76]  Mohsen Guizani,et al.  Software-defined networking security: pros and cons , 2015, IEEE Communications Magazine.

[77]  Andrew T. Campbell,et al.  Open Signaling for ATM, INTERNET and Mobile Networks (OPENSIG'98) , 1999, OPSR.

[78]  Danny Hughes,et al.  Exploring the Security Vulnerabilities of LoRa , 2017, 2017 3rd IEEE International Conference on Cybernetics (CYBCON).

[79]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[80]  Lexi Xu,et al.  Research on SDN/NFV Network Traffic Management and Optimization based on Big Data and Artificial Intelligence , 2018, 2018 18th International Symposium on Communications and Information Technologies (ISCIT).

[81]  Yacine Challal,et al.  C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things , 2014, 2014 International Conference on Advanced Networking Distributed Systems and Applications.

[82]  Mangal Sain,et al.  Survey on security in Internet of Things: State of the art and challenges , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[83]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[84]  Tobias Zillner,et al.  ZigBee Exploited The good , the bad and the ugly , 2015 .

[85]  Denis A. Letavin,et al.  Comparative analysis of standards for Low-power Wide-area Network , 2017, 2017 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SINKHROINFO).

[86]  Thierry Turletti,et al.  A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks , 2014, IEEE Communications Surveys & Tutorials.

[87]  Sven Dietrich,et al.  Network Attack Detection and Defense – Security Challenges and Opportunities of Software-Defined Networking , 2017 .

[88]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[89]  Sarah Abdallah,et al.  Identity-based authentication scheme for the Internet of Things , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[90]  Gurusamy Mohan,et al.  Dynamic attack detection and mitigation in IoT using SDN , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[91]  Arjan Durresi,et al.  Service Cost in Software Defined Networking (SDN) , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[92]  James Michaelis,et al.  SPF: An SDN-based middleware solution to mitigate the IoT information explosion , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[93]  Priyadarsi Nanda,et al.  Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[94]  Sanjay Pawar,et al.  Firewall and load balancing as an application of SDN , 2016, 2016 Conference on Advances in Signal Processing (CASP).

[95]  Seemab Latif,et al.  Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques , 2014, 2014 National Software Engineering Conference.

[96]  Andrea Zanella,et al.  Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.

[97]  Jidong Wang,et al.  An Enhanced Key Management Scheme for LoRaWAN , 2018, SpaCCS.

[98]  Andrea Zanella,et al.  Long-Range IoT Technologies: The Dawn of LoRa™ , 2015, FABULOUS.

[99]  S. Mercy Shalinie,et al.  Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture , 2020, IEEE Internet of Things Journal.

[100]  Kaiming Liu,et al.  A novel min-cost Qos routing algorithm for SDN-based wireless mesh network , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[101]  Yasir Mehmood,et al.  Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.

[102]  Ramon Sanchez-Iborra,et al.  State of the Art in LP-WAN Solutions for Industrial IoT Services , 2016, Sensors.

[103]  Zubair A. Baig,et al.  SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks , 2019, IEEE Access.

[104]  Jonathan Rodriguez,et al.  Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure , 2018, 2018 IEEE International Conference on Communications (ICC).

[105]  Fernand Meyer,et al.  A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.

[106]  Zhu Han,et al.  Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.

[107]  Jidong Wang,et al.  An Enhanced Key Management Scheme for LoRaWAN , 2018, Cryptogr..

[108]  Ilsun You,et al.  An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System , 2018, Sensors.

[109]  Panagiotis G. Sarigiannidis,et al.  Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.

[110]  OthmanMazliza,et al.  Internet of Things security , 2017 .

[111]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[112]  Jorge Bernal Bernabe,et al.  Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems , 2020, Sensors.

[113]  Simone Zulian,et al.  Security threat analysis and countermeasures for LoRaWAN join procedure , 2016 .

[114]  Ren-Hung Hwang,et al.  Energy Depletion Attacks in Low Power Wireless Networks , 2019, IEEE Access.

[115]  Smilty Chacko,et al.  Security mechanisms and Vulnerabilities in LPWAN , 2018, IOP Conference Series: Materials Science and Engineering.