A Combined Attack Scenario to Exploit the Join Procedure of LoRaWAN
In the LoRaWAN network, end devices must initiate the join operation by sending packets to the Network Server. This process contains several flaws that attackers can use to disrupt network functioning. We will study, analyze, and compare several techniques for exploiting vulnerabilities that are typ...
Saved in:
Published in | 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) pp. 188 - 193 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
25.10.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In the LoRaWAN network, end devices must initiate the join operation by sending packets to the Network Server. This process contains several flaws that attackers can use to disrupt network functioning. We will study, analyze, and compare several techniques for exploiting vulnerabilities that are typically conducted during the join procedure in LoRaWAN. Additionally, we propose considering a possible attack scenario, which may occur when the attacker combines some attack techniques to exploit the join procedure. |
---|---|
ISSN: | 2157-023X |
DOI: | 10.1109/ICUMT54235.2021.9631602 |