Attack-aware Synchronization-free Data Timestamping in LoRaWAN

被引:11
|
作者
Gu, Chaojie [1 ]
Jiang, Linshan [1 ]
Tan, Rui [1 ]
Li, Mo [1 ]
Huang, Jun [2 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, N4-B02A-01,50 Nanyang Ave, Singapore 639798, Singapore
[2] MIT, Sloan Sch Management, 100 Main St, Cambridge, MA 02142 USA
关键词
power wide-area networks; LoRaWAN; data timestamping; wireless security;
D O I
10.1145/3474368
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low-power wide-area network technologies such as long-range wide-area network (LoRaWAN) are promising for collecting low-rate monitoring data from geographically distributed sensors, in which timestamping the sensor data is a critical system function. This article considers a synchronization-free approach to timestamping LoRaWAN uplink data based on signal arrival time at the gateway, which well matches LoRaWAN's one-hop star topology and releases bandwidth from transmitting timestamps and synchronizing end devices' clocks at all times. However, we show that this approach is susceptible to a frame delay attack consisting of malicious frame collision and delayed replay. Real experiments show that the attack can affect the end devices in large areas up to about 50,000m(2). In a broader sense, the attack threatens any system functions requiring timely deliveries of LoRaWAN frames. To address this threat, we propose a LoRaTS gateway design that integrates a commodity LoRaWAN gateway and a low-power software-defined radio receiver to track the inherent frequency biases of the end devices. Based on an analytic model of LoRa's chirp spread spectrum modulation, we develop signal processing algorithms to estimate the frequency biases with high accuracy beyond that achieved by LoRa's default demodulation. The accurate frequency bias tracking capability enables the detection of the attack that introduces additional frequency biases. We also investigate and implement a more crafty attack that uses advanced radio apparatuses to eliminate the frequency biases. To address this crafty attack, we propose a pseudorandom interval hopping scheme to enhance our frequency bias tracking approach. Extensive experiments show the effectiveness of our approach in deployments with real affecting factors such as temperature variations.
引用
收藏
页数:31
相关论文
共 50 条
  • [1] Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN
    Gu, Chaojie
    Jiang, Linshan
    Tan, Rui
    Li, Mo
    Huang, Jun
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 100 - 110
  • [2] Attack-Aware Supervisory Control and Data Acquisition (SCADA)
    Alexander, Otis
    Chung, Sam
    Endicott-Popovsky, Barbara
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 251 - 254
  • [3] Synchronization-free data detection for UWB communications
    Lottici, Vincenzo
    Tian, Zhi
    Leus, Geert
    [J]. 2007 14TH IEEE SYMPOSIUM ON COMMUNICATIONS AND VEHICULAR TECHNOLOGY IN THE BENELUX, 2007, : 17 - +
  • [4] Cyber Attack-Aware Security Hardening of Time Synchronization Technologies in WAMPAC Systems
    Zadsar, Masoud
    Ghafouri, Mohsen
    Ameli, Amir
    [J]. 2023 IEEE 2ND INDUSTRIAL ELECTRONICS SOCIETY ANNUAL ON-LINE CONFERENCE, ONCON, 2023,
  • [5] Attack-Aware Security Function Chaining
    Ifflaender, Lukas
    Beierlieb, Lukas
    Kounev, Samuel
    [J]. ELECTRONICS, 2024, 13 (17)
  • [6] Persistency for Synchronization-Free Regions
    Gogte, Vaibhav
    Diestelhorst, Stephan
    Wang, William
    Narayanasamy, Satish
    Chen, Peter M.
    Wenisch, Thomas F.
    [J]. PROCEEDINGS OF THE 39TH ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, PLDI 2018, 2018, : 46 - 61
  • [7] Attack-aware planning of transparent optical networks
    Manousakis, Konstantinos
    Ellinas, Georgios
    [J]. OPTICAL SWITCHING AND NETWORKING, 2016, 19 : 97 - 109
  • [8] Persistency for Synchronization-Free Regions
    Gogte, Vaibhav
    Diestelhorst, Stephan
    Wang, William
    Narayanasamy, Satish
    Chen, Peter M.
    Wenisch, Thomas F.
    [J]. ACM SIGPLAN NOTICES, 2018, 53 (04) : 46 - 61
  • [9] Whistle: Synchronization-Free TDOA for Localization
    Xu, Bin
    Yu, Ran
    Sun, Guodong
    Yang, Zheng
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 760 - 769
  • [10] Optimal attack-aware RWA for scheduled lightpath demands
    Saja Al Mamoori
    Meenakshi Nizampatnam
    Arunita Jaekel
    [J]. SN Applied Sciences, 2019, 1