簡易檢索 / 詳目顯示

研究生: 林靖偉
Ching-Wei Lin
論文名稱: Evaluating Jamming Threat in LoRaWAN
Evaluating Jamming Threat in LoRaWAN
指導教授: 鄭瑞光
Ray-Guang Cheng
口試委員: 李楊漢
Yang-Han Lee
許獻聰
Shian-Tsung Sheu
黎碧煌
Bih-Hwang Lee
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2017
畢業學年度: 105
語文別: 英文
論文頁數: 31
中文關鍵詞: 低功率廣域網路技術LoRaWAN安全性信賴度評估阻斷攻擊實驗
外文關鍵詞: Evaluation, Reliability, Jamming, LPWAN, LoRaWAN, Experiment
相關次數: 點閱:211下載:8
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • LoRaWAN被視為低功率廣域網路技術之中較具有潛力的協定,近期基於LoRa的研究與應用逐漸被提出。其中有研究針對LoRa是否真的適合用於大量裝置的物聯網建置提出疑問並探討。針對此新型的通訊技術所能承受的容量與信賴度值得研究。本論文針對LoRa的封包傳送之間的安全性提出受到干擾攻擊的可能性,透過一般市面上可得的LoRa模組實作出反應式阻斷攻擊器,並藉由實驗評估此攻擊器對LoRaWAN的影響程度。在攻擊器部分,本論文分別對於反應與阻斷的方面進行探討,根據實驗將參數的設定做優化設計,並提出利用LoRa調變的非正交特性來進行阻斷攻擊。本論文所提出的反應式阻斷攻擊器,可以套用在任何使用LoRa收發模組的裝置上,針對單一頻道固定傳送速率的封包進行阻斷攻擊,使得閘道器無法接收受到阻斷攻擊的封包。本論文透過實際的實驗模擬受到阻斷攻擊的LoRaWAN,評估攻擊的影響程度。實驗結果證實LoRa無線通訊技術確實會受到非正交訊號的阻斷攻擊,做為未來LoRaWAN建置的安全性參考。


    LoRaWAN has be seen as the one of most potential protocol in Low Power Wide Area Network (LPWAN). The researches and applications have been studied in recent published work. Face to the huge requirements of communication in the wide coverage, LoRaWAN is doubted on the capacity and reliability. In this paper we evaluate the potential jamming threat in LoRaWAN. By means of jamming attack aiming to LoRa technology. We pretend an attacker who intend to create a jammer based on LoRa transceiver and degrade the transmission reliability. We figure out the proper setting on jammer by presenting three experiments. We characterize the effect of jamming by implementing reactive jammer in built up LoRa devices. Importantly, the presented results on jamming effect provide new security consideration for ap-plication deployment.

    Table of contends Abstract......... 4 Acknowledgement.. 5 List of figures.. 7 List of tables... 8 1.Introduction... 9 2.System model... 14 3.Jamming on LoRa 15 4.Experimental... 20 5.Experimental results 24 6.Conclusion.... 28 Reference....... 29

    [1] J. P. Bardyn, T. Melly, O. Seller, and N. Sornin, "IoT: The Era of LPWAN is Starting Now," ESSCIRC Conference 2016: 42nd European Solid-State Circuits Conference, Lausanne, 2016, pp. 25-30.
    [2] K. Zhao and L. Ge, "A Survey on the Internet of Things Security," 2013 Ninth International Conference on Computational Intelligence and Security, Leshan, 2013, pp. 663-667.
    [3] M. Bor, J. Vidler, and U. Roedig. "LoRa for the Internet of Things," In Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, EWSN '16, pages 361-366, USA, 2016.
    [4] M. C. Bor and U. Roedig., "Do LoRa Low-Power Wide-Area Networks Scale?," in Proc. 19th ACM Int. Conf. Modeling, Analysis Simulation Wireless Mob. Syst., New York, NY, 2016, pp. 59-67.
    [5] K. Mikhaylov, Juha Petaejaejaervi, and T. Haenninen, "Analysis of Capacity and Scalability of the LoRa Low Power Wide Area Network Technology," European Wireless 2016; 22nd European Wireless Conference, Oulu, Finland, 2016, pp. 1-6.
    [6] O. Georgiou and U. Raza, "Low Power Wide Area Network Analysis: Can LoRa Scale?," in IEEE Wireless Communications Letters, vol. 6, no. 2, 2017, pp. 162-165.
    [7] T. Voigt et al., "Mitigating Inter-Network Interference in LoRa Networks," [Online]. Available: https://arxiv.org/abs/1611.00688
    [8] K. Mikhaylov et al., "On LoRaWAN Scalability: Empirical Evaluation of Suscepti-bility to Inter-Network Interference," in press.
    [9] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2005, pp. 46 – 57.
    [10] A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, "A Survey on Jamming Attacks and Countermeasures in WSNs," in IEEE Communications Sur-veys & Tutorials, vol. 11, no. 4, pp. 42-56, Fourth Quarter 2009.
    [11] K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks: The Case of Jammers," in IEEE Communications Surveys & Tutorials, vol. 13, no. 2, pp. 245-257, Second Quarter 2011.
    [12] Z. Yang, P. Cheng, J. Chen, "Learning-based Jamming Attack against Low-duty-cycle Networks," in IEEE Transactions on Dependable and Secure Computing, 2015.
    [13] N. Sornin, M. Luis, T. Eirich, T.Kramp, and O.Hersent, "LoRaWAN Specification," LoRa Alliance Inc., San Ramon, CA, Ver. 1.0.2, July 2016.
    [14] Semtech Corporation. (2015, Mar). "SX1272/73 - 860 MHz to 1020 MHz Low Power Long Range Transceiver." (Revision 3) [Online]. Available: http://www.semtech.com/images/datasheet/sx1272.pdf
    [15] Semtech Corporation. (2014, Oct). "AN1200.21 Reading Channel RSSI During CAD." (Revision 1.0) [Online]. Available: http://www.sem-tech.com/images/datasheet/an1200.21_std.pdf
    [16] LoRa: Orthogonality [Online]. Available: http://sakshamaghoslya.blog-spot.tw/p/lora_6.html
    [17] Nicolas Sornin and Ludovic Champion, U.S. Patent No 14/755,602 (21 January 2016)
    [18] Semtech Corporation. (2013, July). "AN1200.13 SX1272/3/6/7/8 LoRa Modem Design Guide." (Revision 1) [Online]. Available: https://www.semtech.com/images/datasheet/LoraDesignGuide_STD.pdf
    [19] M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders."Short paper: reactive jamming in wireless networks: how realistic is the threat?" In Proc. of ACM WiSec, 2011.

    QR CODE