A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions
Abstract
:1. Introduction
2. Background Information
2.1. LoRaWAN
2.2. LoRaWAN Security
2.3. LoRaWAN Possible Attacks
- i.
- Denial of Service (DoS) attack: The attack is associated with denying services to the entities connected to the network, such as denying the communication between the end devices. Due to the static configuration of keys and nonces, during a JR, an attacker can use the Application Key (AppKey) to re-calculate the MIC and the DevNonce for every transmission [1].
- ii.
- Replay attack: The attacker intercepts the transmitted data in the network by repeating or delaying that data in which the attacker can act as one of the participants in the network. In the case of ABP, the frame counters in the end-devices and the network server are re-used with the same keys as static keys are pre-programmed in the entities before joining request and join accept; hence, an attacker can re-use a previous message for replay attacks [1].
- iii.
- Known-key attack: The attacker exploits the AppSKey, and if the attacker discovers it, then the decryption mechanism will be discovered by the attacker [3].
- iv.
- Eavesdropping attack: Here, the attacker captures a large amount of transmitted information and attempts to extract the important information from the captured message, such as by capturing the AppSKey that is used for encryption and decryption [3].
- v.
- Side-channel attack: In the OTAA phase, a single AppKey without being updated is used throughout to compute the session keys; though the session keys can be re-updated for different sessions, the AppKey remains unchanged. If the AppKey can be intercepted during transmission, then the whole network and communication are compromised [2].
- vi.
- Physical attack: The attacker extracts the pre-shared key, such as an AppKey, from the end devices to make it easier to hijack [18].
3. Related Works
4. Analysis of LoRaWAN Security Models
4.1. Key Management
4.2. Attacks Addressed and Solution Approaches
5. Discussions
6. Possible Research Opportunities
- Kim and Song [2] recommend a dual server mechanism to ease the complexities in layers. One server shall facilitate transmission processes and the other server for facilitate reception processes. Moreover, we recommend an autonomous key generation and update mechanism implemented on the key server; this is to overcome key replay attacks if the old keys are breached by the attacker.
- Similarly, the proposed scheme by Tsai et al. [3] was only evaluated using the formal method. However, the use of security verifying tools such as Scyther and ProVerif should also be considered to check for other security vulnerabilities not proven by mathematical proofs.
- In the same vein, Han and Wang’s [26] proposed scheme should further be investigated by using a security verifying tool to analyse the proposed model for other attacks not analysed in this work that are likely to severely affect the proposed model.
- In Choi et al. [5], we recommend further experiments using security verifying tools to be carried out to analyse more attacks that are likely to compromise the network.
- In the scheme proposed in Prasetyo et al. [27], we suggested future work that considers dynamic and autonomous key updates to avoid replay attacks and security implementation at all entities as well as an entity that is scalable to memory to avoid overheads in a resource-limited FPGA due to complex operations.
- In Ruotsalainen et al. [4], the authors suggested performing a system-level analysis and evaluation for large coverage LPWAN with less energy consumption.
- Similarly, Roselin et al. [28] have suggested minimizing strong interferences when establishing communication in the network between the router and the wireless end devices by synchronization amongst these wireless end devices in their study.
- Naoui et al. [1] recommend an energy harvesting model to sustain the lifespan of LoRaWAN end devices to accommodate repetitive processes of accepting and re-computing session keys.
- Likewise, in the work by Tsai e al. [14], we recommend the use of a security analyser tool on their proposed model to verify other attacks not analysed. This is to identify other attacks existent in the LPWAN invisible to the human eye.
- The proposed SPT model by Gao et al. [29] lacks in-depth evaluations and analyses of the attacks. Thus, we recommend that the work can be extended by taking advantage of the flexibility of tools such as Scyther to effectively analyse the proposed model against all other possible LoRaWAN attacks.
- The security verifying tool is also recommended for the work by Donmez et al. [30].Accordingly, Naoui et al. [31] have suggested the use of a Markov chain model in evaluating the trust values of the proxy nodes following their behavioural history. The chain Markov will be used to change each proxy node’s trust state based on the joining, leaving, and packet relaying phases.
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Naoui, S.; Elhdhili, M.E.; Saidane, L.A. Trusted third party based key management for enhancing LoRaWAN security. In Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, 30 October–3 November 2017; pp. 1306–1313. [Google Scholar]
- Kim, J.; Song, J. A Dual Key-Based Activation Scheme for Secure LoRaWAN. Wirel. Commun. Mob. Comput. 2017, 2017, 6590713. [Google Scholar] [CrossRef]
- Tsai, K.-L.; Huang, Y.-L.; Leu, F.-Y.; You, I.; Huang, Y.-L.; Tsai, C.-H. AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments. IEEE Access 2018, 6, 45325–45334. [Google Scholar] [CrossRef]
- Ruotsalainen, H.; Zhang, J.; Grebeniuk, S. Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Net-works. IEEE Internet Things J. 2019, 7, 1745–1755. [Google Scholar] [CrossRef]
- Choi, J.; Kim, Y. An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system. In Proceedings of the 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, Korea, 13–16 December 2016; pp. 1–4. [Google Scholar]
- Froiz-Míguez, I.; Fraga-Lamas, P.; Fernández-Caramés, T.M. Design, Implementation and Validation of a Bluetooth 5 Real-Time Monitoring System for Large Indoor Environments. Eng. Proc. 2021, 7, 18. [Google Scholar] [CrossRef]
- Bahashwan, A.A.; Anbar, M.; Abdullah, N.; Al-Hadhrami, T.; Hanshi, S.M. Review on Common IoT Communication Technologies for Both Long-Range Network (LPWAN) and Short-Range Network. In Advances on Smart and Soft Computing; Springer: Berlin/Heidelberg, Germany, 2020; pp. 341–353. [Google Scholar]
- Bali, M.S.; Gupta, K.; Bali, K.K.; Singh, P.K. Towards energy efficient NB-IoT: A survey on evaluating its suitability for smart ap-plications. Mater. Today Proc. 2022, 49, 3227–3234. [Google Scholar] [CrossRef]
- Ferreira, C.M.S.; Oliveira, R.A.R.; Silva, J.S. Low-energy smart cities network with LoRa and Bluetooth. In Proceedings of the 2019 7th IEEE Inter-national Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Newark, CA, USA, 4–9 April 2019; pp. 24–29. [Google Scholar]
- Islam, N.; Ray, B.; Pasandideh, F. IoT Based Smart Farming: Are the LPWAN Technologies Suitable for Remote Communication? In Proceedings of the 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), Beijing, China, 14–16 August 2020; pp. 270–276. [Google Scholar]
- Qi, X.; Yu, K.; Sato, T.; Shibata, K.; Brigham, E.; Tokutake, T.; Eguchi, R.; Maruyama, Y.; Wen, Z.; Tamesue, K.; et al. Ledger-based Points Transfer System in LPWAN: From Disaster Management Aspect. In Proceedings of the 2021 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Hangzhou, China, 3–5 December 2021; pp. 150–155. [Google Scholar]
- Rajab, H.; Cinkler, T.; Bouguera, T. Evaluation of Energy Consumption of LPWAN Technologies. 2021. Available online: https://www.researchsquare.com/article/rs-343897/latest.pdf (accessed on 11 June 2022).
- Ntshabele, K.; Isong, B.; Abu-Mahfouz, A.M. CR-LPWAN: Issues, solutions and research directions. In Proceedings of the 2021 IEEE World AI IoT Congress (AIIoT), Virtual Conference, Seattle, WA, USA, 10–13 May 2021; pp. 0504–0511. [Google Scholar]
- Tsai, K.-L.; Huang, Y.-L.; Leu, F.-Y.; You, I. TTP Based High-Efficient Multi-Key Exchange Protocol. IEEE Access 2016, 4, 6261–6271. [Google Scholar] [CrossRef]
- Mekki, K.; Bajic, E.; Chaxel, F.; Meyer, F. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 2019, 5, 1–7. [Google Scholar] [CrossRef]
- Lavric, A.; Popa, V. Internet of things and LoRa™ low-power wide-area networks: A survey. In Proceedings of the 2017 IEEE International Symposium on Signals, Circuits and Systems (ISSCS), Iasi, Romania, 13–14 July 2017; pp. 1–5. [Google Scholar]
- Wixted, A.J.; Kinnaird, P.; Larijani, H.; Tait, A.; Ahmadinia, A.; Strachan, N. Evaluation of LoRa and LoRaWAN for Wireless Sensor Networks. In Proceedings of the 2016 IEEE SENSORS, Orlando, FL, USA, 30 October–3 November 2016; pp. 1–3. [Google Scholar]
- Sanchez-Iborra, R.; Sánchez-Gómez, J.; Pérez, S.; Fernández, P.J.; Santa, J.; Hernández-Ramos, J.L.; Skarmeta, A.F. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach. Sensors 2018, 18, 1833. [Google Scholar] [CrossRef] [PubMed]
- Eldefrawy, M.; Butun, I.; Pereira, N.; Gidlund, M. Formal security analysis of LoRaWAN. Comput. Netw. 2019, 148, 328–339. [Google Scholar] [CrossRef]
- Butun, I.; Pereira, N.; Gidlund, M. Security Risk Analysis of LoRaWAN and Future Directions. Futur. Internet 2018, 11, 3. [Google Scholar] [CrossRef] [Green Version]
- Tomasin, S.; Zulian, S.; Vangelista, L. Security analysis of lorawan join procedure for internet of things networks. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
- Avoine, G.; Ferreira, L. Rescuing LoRaWAN 1.0. In Proceedings of the International Conference on Financial Cryptography and Data Security, Nieuwpoort, Curaçao, 26 February 26–2 March 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 253–271. [Google Scholar]
- Butun, I.; Pereira, N.; Gidlund, M. Analysis of LoRaWAN v1. 1 security. In Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, Los Angeles, CA, USA, 25 June 2018; pp. 1–6. [Google Scholar]
- Noura, H.; Hatoum, T.; Salman, O.; Yaacoub, J.-P.; Chehab, A. LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet Things 2020, 12, 100303. [Google Scholar] [CrossRef]
- Yang, X. LoRaWAN: Vulnerability Analysis and Practical Exploitation. Master’s Thesis, Delft University of Technology, Delft, The Netherlands, 2017. [Google Scholar]
- Han, J.; Wang, J. An Enhanced Key Management Scheme for LoRaWAN. Cryptography 2018, 2, 34. [Google Scholar] [CrossRef]
- Prasetyo, K.N.; Purwanto, Y.; Darlis, D. An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA. In Proceedings of the 2014 2nd International Conference on Information and Communication Technology (ICoICT), Bandung, Indonesia, 28–30 May 2014; pp. 75–79. [Google Scholar]
- Roselin, A.G.; Nanda, P.; Nepal, S. Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks. In Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, 1–4 August 2017; pp. 371–378. [Google Scholar]
- Gao, S.-Y.; Li, X.-H.; Ma, M.-D. A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol. Sensors 2019, 19, 5122. [Google Scholar] [CrossRef]
- Dönmez, T.C.; Nigussie, E. Security of LoRaWAN v1.1 in Backward Compatibility Scenarios. Procedia Comput. Sci. 2018, 134, 51–58. [Google Scholar] [CrossRef]
- Naoui, S.; Elhdhili, M.E.; Saidane, L.A. Enhancing the security of the IoT LoraWAN architecture. In Proceedings of the 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), Paris, France, 22–25 November 2016; pp. 1–7. [Google Scholar]
Sigfox | LoRaWAN | NB-IoT | |
---|---|---|---|
Modulation | BPSK | CSS | QPSK |
Frequency | Unlicensed ISM bands (868 MHz in Europe, 915 MHz in North America, and 433 MHz in Asia) | Unlicensed ISM bands (868 MHz in Europe, 915 MHz in North America, and 433 MHz in Asia) | Licensed LTE frequency bands |
Bandwidth | 100 Hz | 250 kHz and 125 kHz | 200 kHz |
Maximum data rate | 100 bps | 50 kbps | 200 kbps |
Bidirectional | Limited/Half-duplex | Yes/Half-duplex | Yes/Half-duplex |
Maximum payload length | 12 bytes (UL), 8 bytes (DL) | 243 bytes | 1600 bytes |
Range | 10 km (urban), 40 km (rural) | 5 km (urban), 20 km (rural) | 1 km (urban), 10 km (rural) |
Interface immunity | Very high | Very high | Low |
Authentication & encryption | Not supported | Yes (AES 128b) | Yes (LTE encryption) |
Adaptive data rate | No | Yes | No |
Handover | End devices do not join a single base station | End devices do not join a single base station | End devices join a single base station |
Localization | Yes (RSSI) | Yes (TDOA) | No (under specification) |
Allow private network | No | Yes | No |
Standardization | Sigfox company is collaborating with ETSI on the standardization of the Sigfox-based network | LoRa-Alliance | 3GPP |
Ref. | Security Algorithm | Key Gen. Time | Key Update Time | Execution Time | Memory Usage/Overheads | Energy Consume | Limitations |
---|---|---|---|---|---|---|---|
[2] | AES-128-SE | N/A | N/A | N/A | High | Low | Static key generation and loading, memory flooding due to storing nonces |
[3] | AES-128 bit and D-Box | N/A | N/A | N/A | N/A | Low | Unsecure communication layers except for the application layer. No periodic updates for NwSKey in the MAC layer |
[26] | Stream Cipher-Based KDF | High | Long | Less | High | N/A | Memory overheads in the end devices due to pre-sharing and distribution of the root keys |
[5] | Rabbit Stream Cipher Based-KDF-SE | N/A | N/A | Faster encryption and velocity-time | High | N/A | High memory usage by generating additional 4-byte data of the devices in encryption and decryption. |
[27] | Blowfish-SE | N/A | N/A | Faster and less encryption time | High | N/A | Not be suitable for scalable networks, and complex operations due to limited memory in FPGA |
[4] | AES-128 SE | N/A | High | N/A | N/A | N/A | Irregular key refreshment periods |
Ref. | Security Algorithm | Key Gen. Time | Key Update Time | Execution Time | Memory Usage/Overheads | Energy Consume | Limitations |
---|---|---|---|---|---|---|---|
[28] | AES-128 SE | N/A | N/A | Less | N/A | Low | Limited to validation of three attacks only |
[1] | AES-128 SE | N/A | N/A | Less | Low | Low | Unsecured random numbers to compute session keys. Static NwKey changed in every session |
[14] | ECC-Diffie Hellman algorithm (AE) | Faster | Faster | Faster | N/A | High | Limited validation and restriction of analysed attacks |
[29] | AES-128 SE | N/A | N/A | Less | Low | Low | Evaluations of attacks are limited |
[30] | AES-128 SE | N/A | N/A | N/A | Low | N/A | Forward compatibility should not be examined after backward compatibility |
[31] | AES-128 SE | N/A | N/A | N/A | N/A | N/A | Asymmetric encryption is heavy on resources |
Ref. | DoS Attack | Replay Attack | Known-Key Attack | Eavesdropping Attack | Side-Channel Attacks | Physical Attack | Other Attack(s) | Solutions |
---|---|---|---|---|---|---|---|---|
[2] | No | Yes | No | No | No | No | No | Dual key based activation system |
[3] | No | Yes | Yes | Yes | No | No | No | SeLPC with time key and lookup D-Box |
[26] | No | No | No | No | Yes | No | Crypto analysis | Rabbit Stream Cipher-Based KDF |
[5] | No | No | No | No | Yes | No | No | Rabbit Stream Cipher-Based KDF with 16-byte and 4-byte dummy data |
[27] | No | No | No | No | No | No | No | Blowfish symmetric encryption with minimized feistel rounds in FPGA |
[4] | No | Yes | N/A | Yes | No | No | Key-guessing, brute-force, quantum computer | DCT, BCH encoding, True Random Number Generator |
[28] | No | Yes | No | No | No | No | Impersonation, main-in-the-middle | Unique flight keys and the AES-128 ECB algorithm |
[1] | No | Yes | No | No | No | No | No | One-time password gen- Eratot for AppKey re- updates |
[14] | No | Yes | Yes | Yes | No | No | Forgery, impersonation | Trusted Third party, and ECC with 2D operation binary adder, and logocal XOR |
[29] | No | Yes | No | Yes | No | No | No | Modified MIC format And DevNoce. OTP |
[30] | Yes | Yes | No | Yes | No | No | ACK spoofing, bit flipping | AES 128-bit counter |
[31] | No | No | No | No | No | No | Man-in-the-middle | AES 128-bit symmetric encryption and SSL |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ntshabele, K.; Isong, B.; Gasela, N.; Abu-Mahfouz, A.M. A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions. Mathematics 2022, 10, 3421. https://doi.org/10.3390/math10193421
Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM. A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions. Mathematics. 2022; 10(19):3421. https://doi.org/10.3390/math10193421
Chicago/Turabian StyleNtshabele, Koketso, Bassey Isong, Naison Gasela, and Adnan M. Abu-Mahfouz. 2022. "A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions" Mathematics 10, no. 19: 3421. https://doi.org/10.3390/math10193421
APA StyleNtshabele, K., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2022). A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions. Mathematics, 10(19), 3421. https://doi.org/10.3390/math10193421