A Combined Attack Scenario to Exploit the Join Procedure of LoRaWAN

In the LoRaWAN network, end devices must initiate the join operation by sending packets to the Network Server. This process contains several flaws that attackers can use to disrupt network functioning. We will study, analyze, and compare several techniques for exploiting vulnerabilities that are typ...

Full description

Saved in:
Bibliographic Details
Published in2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) pp. 188 - 193
Main Authors Le, Duc Tran, Dinh, Truong Duy, Pham, Van Dai, Kirichek, Ruslan, Filin, Egor, Shestakov, Alexander
Format Conference Proceeding
LanguageEnglish
Published IEEE 25.10.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In the LoRaWAN network, end devices must initiate the join operation by sending packets to the Network Server. This process contains several flaws that attackers can use to disrupt network functioning. We will study, analyze, and compare several techniques for exploiting vulnerabilities that are typically conducted during the join procedure in LoRaWAN. Additionally, we propose considering a possible attack scenario, which may occur when the attacker combines some attack techniques to exploit the join procedure.
ISSN:2157-023X
DOI:10.1109/ICUMT54235.2021.9631602