The Internet of Things (IoT) paradigm is nowadays adopted by many applications, involving several communication technologies. In this context, Low-Power Wide-Area Network (LPWAN) protocols are quickly developing, achieving high range communication while maintaining a low energy consumption. Such protocols had to be designed from scratch to cope with the scarce computational resources offered by an IoT device. LoRaWAN is one of the most rapidly expanding LPWAN protocols, thanks to its low cost of devices and operation. During the years, LoRaWAN underwent extensive security assessments, discovering and mitigating new vulnerabilities, and the newest standard version 1.1 is considered to be secure. However, in this thesis we discover new vulnerabilities that could be exploited by a malicious third party to achieve different goals. One vulnerability deals with a Denial-of-Service of downlink messages, impacting application operation as well as network control. The other one deals with the de-anonymization of a device, discovering the correlation between DevAddr and DevEUI, causing information leakages and privacy concerns. Moreover, we consider the role of Edge computing in LoRaWAN and how one can leverage it in order to enhance the security and to optimize network operation in a LoRaWAN environment.

Challenges and opportunities in LoRaWAN security: exploring protocol vulnerabilities, privacy threats and the role of edge computing / Spadaccino, Pietro. - (2024 Jan 17).

Challenges and opportunities in LoRaWAN security: exploring protocol vulnerabilities, privacy threats and the role of edge computing

SPADACCINO, PIETRO
17/01/2024

Abstract

The Internet of Things (IoT) paradigm is nowadays adopted by many applications, involving several communication technologies. In this context, Low-Power Wide-Area Network (LPWAN) protocols are quickly developing, achieving high range communication while maintaining a low energy consumption. Such protocols had to be designed from scratch to cope with the scarce computational resources offered by an IoT device. LoRaWAN is one of the most rapidly expanding LPWAN protocols, thanks to its low cost of devices and operation. During the years, LoRaWAN underwent extensive security assessments, discovering and mitigating new vulnerabilities, and the newest standard version 1.1 is considered to be secure. However, in this thesis we discover new vulnerabilities that could be exploited by a malicious third party to achieve different goals. One vulnerability deals with a Denial-of-Service of downlink messages, impacting application operation as well as network control. The other one deals with the de-anonymization of a device, discovering the correlation between DevAddr and DevEUI, causing information leakages and privacy concerns. Moreover, we consider the role of Edge computing in LoRaWAN and how one can leverage it in order to enhance the security and to optimize network operation in a LoRaWAN environment.
17-gen-2024
File allegati a questo prodotto
File Dimensione Formato  
Tesi_dottorato_Spadaccino.pdf

accesso aperto

Note: tesi completa
Tipologia: Tesi di dottorato
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 6.3 MB
Formato Adobe PDF
6.3 MB Adobe PDF

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1700890
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact