TU Darmstadt / ULB / TUprints

LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios

Kuntke, Franz ; Romanenko, Vladimir ; Linsner, Sebastian ; Steinbrink, Enno ; Reuter, Christian (2022)
LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios.
In: Transactions on Emerging Telecommunications Technologies, 2022, 33 (5)
doi: 10.26083/tuprints-00021543
Article, Secondary publication, Publisher's Version

[img] Text
ETT_ETT4452.pdf
Copyright Information: CC BY-NC 4.0 International - Creative Commons, Attribution NonCommercial.

Download (1MB)
Item Type: Article
Type of entry: Secondary publication
Title: LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios
Language: English
Date: 24 June 2022
Place of Publication: Darmstadt
Year of primary publication: 2022
Publisher: John Wiley & Sons
Journal or Publication Title: Transactions on Emerging Telecommunications Technologies
Volume of the journal: 33
Issue Number: 5
Collation: 20 Seiten
DOI: 10.26083/tuprints-00021543
Corresponding Links:
Origin: Secondary publication DeepGreen
Abstract:

The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.

Status: Publisher's Version
URN: urn:nbn:de:tuda-tuprints-215433
Classification DDC: 000 Generalities, computers, information > 004 Computer science
Divisions: 20 Department of Computer Science > Science and Technology for Peace and Security (PEASEC)
TU-Projects: Bund/BMBF|01IS17030B|HyServ
DFG|GRK 2050|TP_Reuter_GRK_2050_a
Date Deposited: 24 Jun 2022 13:04
Last Modified: 14 Feb 2024 15:19
SWORD Depositor: Deep Green
URI: https://tuprints.ulb.tu-darmstadt.de/id/eprint/21543
PPN: 499644360
Export:
Actions (login required)
View Item View Item