Kuntke, Franz ; Romanenko, Vladimir ; Linsner, Sebastian ; Steinbrink, Enno ; Reuter, Christian (2022)
LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios.
In: Transactions on Emerging Telecommunications Technologies, 2022, 33 (5)
doi: 10.26083/tuprints-00021543
Article, Secondary publication, Publisher's Version
Text
ETT_ETT4452.pdf Copyright Information: CC BY-NC 4.0 International - Creative Commons, Attribution NonCommercial. Download (1MB) |
Item Type: | Article |
---|---|
Type of entry: | Secondary publication |
Title: | LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios |
Language: | English |
Date: | 24 June 2022 |
Place of Publication: | Darmstadt |
Year of primary publication: | 2022 |
Publisher: | John Wiley & Sons |
Journal or Publication Title: | Transactions on Emerging Telecommunications Technologies |
Volume of the journal: | 33 |
Issue Number: | 5 |
Collation: | 20 Seiten |
DOI: | 10.26083/tuprints-00021543 |
Corresponding Links: | |
Origin: | Secondary publication DeepGreen |
Abstract: | The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice. |
Status: | Publisher's Version |
URN: | urn:nbn:de:tuda-tuprints-215433 |
Classification DDC: | 000 Generalities, computers, information > 004 Computer science |
Divisions: | 20 Department of Computer Science > Science and Technology for Peace and Security (PEASEC) |
TU-Projects: | Bund/BMBF|01IS17030B|HyServ DFG|GRK 2050|TP_Reuter_GRK_2050_a |
Date Deposited: | 24 Jun 2022 13:04 |
Last Modified: | 14 Feb 2024 15:19 |
SWORD Depositor: | Deep Green |
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/21543 |
PPN: | 499644360 |
Export: |
View Item |