Abstract
Sigfox is a popular communication and security protocol which allows setting up low-power wide-area networks for the Internet of Things. Currently, Sigfox networks operate in 72 countries, and cover 1.3 billion people. In this paper, we make an extensive analysis of the security mechanisms used to protect the radio interface in Sigfox. We describe news attacks against data authenticity, which is the only mandatory security property in Sigfox. Namely we describe how to replay frames, and how to compute forgeries. In addition, we highlight a flaw in the (optional) data encryption procedure. Our attacks do not exploit implementation or hardware bugs, nor do they imply a physical access to any equipment (e.g., legitimate end-device). They rely only on the peculiarities of the Sigfox security protocol. Our analysis is supported by practical experiments made in interaction with the Sigfox back-end network. These experiments validate our findings. Finally, we present efficient counter-measures which are likely straightforward to implement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Coman, F.L., Malarski, K.M., Petersen, M.N., Ruepp, S.: Security issues in Internet of Things: Vulnerability analysis of LoRaWAN, Sigfox and NB-IoT. In: 2019 Global IoT Summit (2019)
Euchner, F.: Hunting the Sigfox - Wireless IoT network security, December 2018. https://jeija.net/renard-slides/
Euchner, F.: librenard - Sigfox protocol library, September 2018. https://github.com/Jeija/librenard
Euchner, F.: renard-phy - Sigfox protocol physical layer, September 2018. https://github.com/Jeija/renard-phy
Euchner, F.: Sigfox radio protocol overview and specifications, December 2018. https://github.com/Jeija/renard-spec/releases
Ferreira, L.: (In)security of the Radio Interface in Sigfox. Cryptology ePrint Archive, Report 2020/1575 (2020). https://eprint.iacr.org/2020/1575
Lifchitz, R.: IoT & Sigfox security, November 2016. https://speakerdeck.com/rlifchitz/iot-and-sigfox-security, Cyber Security Alliance Conference
LoRa Alliance Technical committee: LoRaWAN 1.0.3 specification, July 2018. https://lora-alliance.org/resource-hub/lorawanr-specification-v103
Malarski, K.M.: Personal communication, December 2020
National Security Agency’s Research Directorate: Ghidra. https://ghidra-sre.org/, v9.1.2
Ossmann, M.: HackRF. https://greatscottgadgets.com/hackrf/
Pinault, P.: Stop telling me Sigfox is clear payload, for real you’re just lazy, December 2018. https://www.disk91.com/2018/technology/sigfox/stop-telling-me-sigfox-is-clear-payload-for-real-youre-just-lazy/
Sigfox: Sigfox - Technical overview, May 2017. https://www.disk91.com/wp-content/uploads/2017/05/4967675830228422064.pdf
Sigfox: Coverage, July 2020. https://www.sigfox.com/en/coverage
Sigfox: Our story, December 2020. https://www.sigfox.com/en/sigfox-story
Sigfox: Sigfox connected objects: Radio specifications, February 2020. https://build.sigfox.com/sigfox-device-radio-specifications, ref. EP-SPECS, rev. 1.5
Song, J., Poovendran, R., Lee, J., Iwata, T.: The AES-CMAC algorithm, June 2006. https://tools.ietf.org/html/rfc4493, RFC 4493
Sornin, N.: LoRaWAN 1.1 specification, October 2017. https://lora-alliance.org/resource-hub/lorawantm-specification-v11
STMicroelectronics: X-CUBE-SFOX - STM32 Sigfox software expansion for STM32Cube. https://www.st.com/en/embedded-software/x-cube-sfox.html
Acknowledgment
We thank Florian Euchner and Paul Pinault for their previous work on Sigfox.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Practical Experiments
Figure 2 corresponds to screen shots made, from top to bottom, of two forged frames of type “clear_6” (the first original frame is made of 6 zero bytes, the second one of random bytes), and two forged frames of type “encrypted_5” (the first original frame is made of 5 zero bytes, the second one of random bytes) received on the back-end network. Table 5 lists an example of each forgery type (Fig. 1).
B Sigfox Architecture
Sigfox architecture (source: [13])
C Sigfox Coverage in Several Geographic Areas
See (Fig. 4).
Sigfox coverage in several geographic areas (source: [14]). Actual deployments appear in
, ongoing deployments appear in
. (Color figure online)
Rights and permissions
Copyright information
© 2021 International Financial Cryptography Association
About this paper
Cite this paper
Ferreira, L. (2021). Sigforgery: Breaking and Fixing Data Authenticity in Sigfox. In: Borisov, N., Diaz, C. (eds) Financial Cryptography and Data Security. FC 2021. Lecture Notes in Computer Science(), vol 12674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-64322-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-64322-8_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-64321-1
Online ISBN: 978-3-662-64322-8
eBook Packages: Computer ScienceComputer Science (R0)