Exploring the security vulnerabilities of LoRa
© 2017 IEEE. Internet-of-Things (IoT) deployments increasingly incorporate long range communication technologies. To support this transition, wide area IoT deployments are employing LoRa as their communication technology of choice due to its low power consumption and long range. The security of LoRa...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | © 2017 IEEE. Internet-of-Things (IoT) deployments increasingly incorporate long range communication technologies. To support this transition, wide area IoT deployments are employing LoRa as their communication technology of choice due to its low power consumption and long range. The security of LoRa networks and devices is currently being put to the test in the wild, and has already become a major challenge. New features and characteristics of LoRa technology also intorduce new vulnerabilities against security attacks. In this paper, we investigate potential security vulnerabilities in LoRa. In particular, we analyze the LoRa network stack and discuss the possible susceptibility of LoRa devices to different types of attacks using commercial-off-the-shelf hardware. Our analysis shows that the long range transmissions of LoRa are vulnerable to multiple security attacks. |
---|---|
ISSN: | 2475-6113 |