skip to main content
10.1145/3339252.3340525acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Energy Attack in LoRaWAN: Experimental Validation

Published: 26 August 2019 Publication History

Abstract

Myriads of new devices take their places around us every single day, making a decisive step towards bringing the concept of the Internet of Things (IoT) in reality. The Low Power Wide Area Networks (LPWANs) are today considered to be one of the most perspective connectivity enablers for the resource and traffic limited IoT. In this paper, we focus on one of the most widely used LPWAN technologies, named LoRaWAN. Departing from the traditional data-focused security attacks, in this study we investigate the robustness of LoRaWAN against energy (depletion) attacks. For many IoT devices, the energy is a limited and very valuable resource, and thus in the near future the device's energy may become the target of an intentional attack. Therefore, in the paper, we first define and discuss the possible energy attack vectors, and then experimentally validate the feasibility of an energy attack over one of these vectors. Our results decisively show that energy attacks in LoRaWAN are possible and may cause the affected device to lose a substantial amount of energy. Specifically, depending on the device's SF (Spreading Factor), the demonstrated attack increased the total energy consumption during a single communication event 36% to 576%. Importantly, the shown attack does not require the attacker to have any keys or other confidential data and can be carried against any LoRaWAN device. The presented results emphasize the importance of energy security for LPWANs in particular, and IoT in general.

References

[1]
5GTN. 2019. 5G Test Network. https://5gtn.fi/. Online; accessed 30 April 2019.
[2]
Sergey Andreev, Olga Galinina, Alexander Pyattaev, Mikhail Gerasimenko, Tuomas Tirronen, Johan Torsner, Joachim Sachs, Mischa Dohler, and Yevgeni Koucheryavy. 2015. Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap. IEEE Communications Magazine 53, 9 (2015), 32--40.
[3]
Emekcan Aras, Nicolas Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, and Danny Hughes. 2017. Selective jamming of LoRaWAN using commodity hardware. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 363--372.
[4]
Lluís Casals, Bernat Mir, Rafael Vidal, and Carles Gomez. 2017. Modeling the energy performance of LoRaWAN. Sensors 17, 10 (2017), 2364.
[5]
Eef Van Es, Harald Vranken, and Arjen Hommersom. 2018. Denial-of-Service Attacks on LoRaWAN. Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018 (2018).
[6]
Alexander Gladisch, Simon Rietschel, Thomas Mundt, Johann Bauer, Johannes Goltz, and Simeon Wiedenmann. 2018. Securely Connecting IoT Devices with LoRaWAN. 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (2018).
[7]
Jaehyu Kim and JooSeok Song. 2017. A simple and efficient replay attack prevention scheme for LoRaWAN. In Proceedings of the 2017 the 7th International Conference on Communication and Network Security. ACM, 32--36.
[8]
Jaehyu Kim and Jooseok Song. 2018. A Secure Device-to-Device Link Establishment Scheme for LoRaWAN. IEEE Sensors Journal 18, 5 (2018), 2153âĂŞ2160.
[9]
JungWoon Lee, DongYeop Hwang, JiHong Park, and Ki-Hyung Kim. 2017. Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. In 2017 International Conference on Information Networking (ICOIN). IEEE, 549--551.
[10]
LoRa ALLIANCE. 2017. LoRaWANTM 1.1 Specification. https://lora-alliance.org/resource-hub/lorawantm-specification-v11. Accessed 30 April 2019.
[11]
Konstantin Mikhaylov and Juha Petäjäjärvi. 2017. Design and implementation of the plug&play enabled flexible modular wireless sensor and actuator network platform. Asian Journal of Control 19, 4 (2017), 1392--1412.
[12]
Ministry for Primary Industries. 2018. LPWAN: The fastest growing IoT communication technology. https://www.iot-now.com/2018/10/29/89895-lpwan-fastest-growing-iot-communication-technology/. Online; accessed 30 April 2019.
[13]
Thomas Mundt, Alexander Gladisch, Simon Rietschel, Johann Bauer, Johannes Goltz, and Simeon Wiedenmann. 2018. General Security Considerations of LoRaWAN Version 1.1 Infrastructures. In Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access. ACM, 118--123.
[14]
SeungJae Na, DongYeop Hwang, WoonSeob Shin, and Ki-Hyung Kim. 2017. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In 2017 International Conference on Information Networking (ICOIN). IEEE, 718--720.
[15]
Sarra Naoui, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. 2017. Trusted Third Party Based Key Management for Enhancing LoRaWAN Security. 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) (2017).
[16]
Van-Linh Nguyen, Po-Ching Lin, and Ren-Hung Hwang. 2019. Energy Depletion Attacks in Low Power Wireless Networks. IEEE Access 7 (2019), 51915--51932.
[17]
Bogdan Oniga, Vasile Dadarlat, Elie De Poorter, and Adrian Munteanu. 2017. A secure LoRaWAN sensor network architecture. 2017 Ieee Sensors (2017).
[18]
Usman Raza, Parag Kulkarni, and Mahesh Sooriyabandara. 2017. Low power wide area networks: An overview. IEEE Communications Surveys & Tutorials 19, 2 (2017), 855--873.
[19]
Ramon Sanchez-Iborra, Jesus Sanchez-Gomez, Salvador Perez, Pedro J. Fernandez, Jose Santa, Jose L. Hernandez-Ramos, and Antonio F. Skarmeta. 2018. Internet Access for LoRaWAN Devices Considering Security Issues. 2018 Global Internet of Things Summit (GIoTS) (2018).
[20]
Semtech. 2017. User Guide to the LoRa® PicoCell Gateway V1.0. https://www.semtech.com/uploads/documents/picocell_gateway_user_guide.pdf. Online; accessed 30 April 2019.
[21]
Statista. 2018. Share of LPWAN IC module shipments by technology worldwide in 2017. https://www.statista.com/statistics/880822/lpwan-ic-market-share-by-technology/. Online; accessed 30 April 2019.
[22]
Woo-Jin Sung, Hyeong-Geun Ahn, Jong-Beom Kim, and Seong-Gon Choi. 2018. Protecting end-device from replay attack on LoRaWAN. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE.
[23]
Stefano Tomasin, Simone Zulian, and Lorenzo Vangelista. 2017. Security analysis of lorawan join procedure for internet of things networks. In 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 1--6.
[24]
Lorenzo Vangelista. 2017. Frequency shift chirp modulation: The LoRa modulation. IEEE Signal Processing Letters 24, 12 (2017), 1818--1821.

Cited By

View all
  • (2025)Evaluating the Performance of LoRa Networks: A Study on Disaster Monitoring ScenariosIoT10.3390/iot60100146:1(14)Online publication date: 12-Feb-2025
  • (2025)A Comprehensive Survey of Data-Driven Solutions for LoRaWAN: Challenges and Future DirectionsACM Transactions on Internet of Things10.1145/37119536:1(1-36)Online publication date: 10-Jan-2025
  • (2025)Classification and Characterization of LoRaWAN Energy Depletion Attacks: A ReviewIEEE Sensors Journal10.1109/JSEN.2024.350425925:2(2141-2156)Online publication date: 15-Jan-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
August 2019
979 pages
ISBN:9781450371643
DOI:10.1145/3339252
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 August 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Energy Attack
  2. Experiment
  3. IoT
  4. LPWAN
  5. LoRa
  6. LoRaWAN
  7. Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES '19

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)3
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Evaluating the Performance of LoRa Networks: A Study on Disaster Monitoring ScenariosIoT10.3390/iot60100146:1(14)Online publication date: 12-Feb-2025
  • (2025)A Comprehensive Survey of Data-Driven Solutions for LoRaWAN: Challenges and Future DirectionsACM Transactions on Internet of Things10.1145/37119536:1(1-36)Online publication date: 10-Jan-2025
  • (2025)Classification and Characterization of LoRaWAN Energy Depletion Attacks: A ReviewIEEE Sensors Journal10.1109/JSEN.2024.350425925:2(2141-2156)Online publication date: 15-Jan-2025
  • (2025)Cybersecurity of the Low-Power Wide Area Networks (LPWAN)Encyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1802(540-542)Online publication date: 8-Jan-2025
  • (2024)Handling Jamming Attacks in a LoRa Network2024 IEEE/ACM Ninth International Conference on Internet-of-Things Design and Implementation (IoTDI)10.1109/IoTDI61053.2024.00017(146-157)Online publication date: 13-May-2024
  • (2023)Towards Secure Edge-Based LoRaWAN for Next Generation Wireless Communications2023 18th Iberian Conference on Information Systems and Technologies (CISTI)10.23919/CISTI58278.2023.10212054(1-8)Online publication date: 20-Jun-2023
  • (2023)Jamming of LoRa PHY and CountermeasureACM Transactions on Sensor Networks10.1145/358313719:4(1-27)Online publication date: 16-May-2023
  • (2023)LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic MitigationACM Transactions on Sensor Networks10.1145/356197318:4(1-55)Online publication date: 7-Mar-2023
  • (2023)Energy-Sustainable IoT Connectivity: Vision, Technological Enablers, Challenges, and Future DirectionsIEEE Open Journal of the Communications Society10.1109/OJCOMS.2023.33238324(2609-2666)Online publication date: 2023
  • (2023)Bit flipping attack detection in low power wide area networks using a deep learning approachPeer-to-Peer Networking and Applications10.1007/s12083-023-01511-y16:4(1916-1926)Online publication date: 13-Jun-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media