Skip to main content

Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12674))

Included in the following conference series:

Abstract

Sigfox is a popular communication and security protocol which allows setting up low-power wide-area networks for the Internet of Things. Currently, Sigfox networks operate in 72 countries, and cover 1.3 billion people. In this paper, we make an extensive analysis of the security mechanisms used to protect the radio interface in Sigfox. We describe news attacks against data authenticity, which is the only mandatory security property in Sigfox. Namely we describe how to replay frames, and how to compute forgeries. In addition, we highlight a flaw in the (optional) data encryption procedure. Our attacks do not exploit implementation or hardware bugs, nor do they imply a physical access to any equipment (e.g., legitimate end-device). They rely only on the peculiarities of the Sigfox security protocol. Our analysis is supported by practical experiments made in interaction with the Sigfox back-end network. These experiments validate our findings. Finally, we present efficient counter-measures which are likely straightforward to implement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Coman, F.L., Malarski, K.M., Petersen, M.N., Ruepp, S.: Security issues in Internet of Things: Vulnerability analysis of LoRaWAN, Sigfox and NB-IoT. In: 2019 Global IoT Summit (2019)

    Google Scholar 

  2. Euchner, F.: Hunting the Sigfox - Wireless IoT network security, December 2018. https://jeija.net/renard-slides/

  3. Euchner, F.: librenard - Sigfox protocol library, September 2018. https://github.com/Jeija/librenard

  4. Euchner, F.: renard-phy - Sigfox protocol physical layer, September 2018. https://github.com/Jeija/renard-phy

  5. Euchner, F.: Sigfox radio protocol overview and specifications, December 2018. https://github.com/Jeija/renard-spec/releases

  6. Ferreira, L.: (In)security of the Radio Interface in Sigfox. Cryptology ePrint Archive, Report 2020/1575 (2020). https://eprint.iacr.org/2020/1575

  7. Lifchitz, R.: IoT & Sigfox security, November 2016. https://speakerdeck.com/rlifchitz/iot-and-sigfox-security, Cyber Security Alliance Conference

  8. LoRa Alliance Technical committee: LoRaWAN 1.0.3 specification, July 2018. https://lora-alliance.org/resource-hub/lorawanr-specification-v103

  9. Malarski, K.M.: Personal communication, December 2020

    Google Scholar 

  10. National Security Agency’s Research Directorate: Ghidra. https://ghidra-sre.org/, v9.1.2

  11. Ossmann, M.: HackRF. https://greatscottgadgets.com/hackrf/

  12. Pinault, P.: Stop telling me Sigfox is clear payload, for real you’re just lazy, December 2018. https://www.disk91.com/2018/technology/sigfox/stop-telling-me-sigfox-is-clear-payload-for-real-youre-just-lazy/

  13. Sigfox: Sigfox - Technical overview, May 2017. https://www.disk91.com/wp-content/uploads/2017/05/4967675830228422064.pdf

  14. Sigfox: Coverage, July 2020. https://www.sigfox.com/en/coverage

  15. Sigfox: Our story, December 2020. https://www.sigfox.com/en/sigfox-story

  16. Sigfox: Sigfox connected objects: Radio specifications, February 2020. https://build.sigfox.com/sigfox-device-radio-specifications, ref. EP-SPECS, rev. 1.5

  17. Song, J., Poovendran, R., Lee, J., Iwata, T.: The AES-CMAC algorithm, June 2006. https://tools.ietf.org/html/rfc4493, RFC 4493

  18. Sornin, N.: LoRaWAN 1.1 specification, October 2017. https://lora-alliance.org/resource-hub/lorawantm-specification-v11

  19. STMicroelectronics: X-CUBE-SFOX - STM32 Sigfox software expansion for STM32Cube. https://www.st.com/en/embedded-software/x-cube-sfox.html

Download references

Acknowledgment

We thank Florian Euchner and Paul Pinault for their previous work on Sigfox.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Loïc Ferreira .

Editor information

Editors and Affiliations

Appendices

A Practical Experiments

Fig. 1.
figure 1

Experiment bench

Fig. 2.
figure 2

Screen shots of forged frames accepted by the Sigfox back-end network. From top to bottom, the two pairs of frames correspond to the forgery types “clear_6” and “encrypted_5”. For each forgery type, the pair of genuine frames corresponds respectively to zero bytes and random bytes in the payload.

Figure 2 corresponds to screen shots made, from top to bottom, of two forged frames of type “clear_6” (the first original frame is made of 6 zero bytes, the second one of random bytes), and two forged frames of type “encrypted_5” (the first original frame is made of 5 zero bytes, the second one of random bytes) received on the back-end network. Table 5 lists an example of each forgery type (Fig. 1).

Table 5. Samples of forged frames. If the uplink frame is encrypted, the data received on the back-end is first decrypted, and then stored. The type “encrypted_4” has not been tested in real-life experiments.

B Sigfox Architecture

Fig. 3.
figure 3

Sigfox architecture (source: [13])

C Sigfox Coverage in Several Geographic Areas

See (Fig. 4).

Fig. 4.
figure 4

Sigfox coverage in several geographic areas (source: [14]). Actual deployments appear in , ongoing deployments appear in . (Color figure online)

Rights and permissions

Reprints and permissions

Copyright information

© 2021 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ferreira, L. (2021). Sigforgery: Breaking and Fixing Data Authenticity in Sigfox. In: Borisov, N., Diaz, C. (eds) Financial Cryptography and Data Security. FC 2021. Lecture Notes in Computer Science(), vol 12674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-64322-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-64322-8_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-64321-1

  • Online ISBN: 978-3-662-64322-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics