Analysis of Lorawan Protocol and Attacks Against Lorawan-Based IoT Devices
In this study, the LoRaWAN protocol, which is a promising candidate for Low-Power Wide Area Network (LPWAN) in terms of network capacity, network security, battery life, low cost and data transmission capabilities, has been selected to examine and analyze its security risks. The Internet of Things (...
Saved in:
Published in | International Journal of Applied Methods in Electronics and Computers |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
30.06.2024
|
Online Access | Get full text |
Cover
Loading…
Summary: | In this study, the LoRaWAN protocol, which is a promising candidate for Low-Power Wide Area Network (LPWAN) in terms of network capacity, network security, battery life, low cost and data transmission capabilities, has been selected to examine and analyze its security risks. The Internet of Things (IoT) concept has been explored, and various network types and architectures have been investigated and compared with the LoRaWAN protocol. Subsequently, attacks on IoT networks, the countermeasures taken by manufacturers, and relevant academic studies on this topic have been examined. The main subject of the study, LoRaWAN, has been explained in terms of its versions, architecture, components, classes, and network layers. Vulnerabilities, security risks, and types of attacks have been categorized and thoroughly explained and a risk assessment has been conducted to evaluate the impact of these attack types. Based on the findings, solutions to prevent or mitigate attacks for four specific types of attacks against the LoRaWAN protocol have been proposed and presented to end users.
In this study, the LoRaWAN protocol, which is a promising candidate for Low-Power Wide Area Network (LPWAN) in terms of network capacity, network security, battery life, low cost and data transmission capabilities, has been selected to examine and analyze its security risks. The Internet of Things (IoT) concept has been explored, and various network types and architectures have been investigated and compared with the LoRaWAN protocol. Subsequently, attacks on IoT networks, the countermeasures taken by manufacturers, and relevant academic studies on this topic have been examined. The main subject of the study, LoRaWAN, has been explained in terms of its versions, architecture, components, classes, and network layers. Vulnerabilities, security risks, and types of attacks have been categorized and thoroughly explained and a risk assessment has been conducted to evaluate the impact of these attack types. Based on the findings, solutions to prevent or mitigate attacks for four specific types of attacks against the LoRaWAN protocol have been proposed and presented to end users. |
---|---|
ISSN: | 3023-4409 3023-4409 |
DOI: | 10.58190/ijamec.2024.95 |