IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN

INGHAM, Max, MARCHANG, Jims and BHOWMIK, Deepayan (2020). IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN. IET Information Security.

Marchang___IoTSecurityVulnerabilities(AM).pdf - Accepted Version
All rights reserved.

Download (1MB) | Preview
Official URL:
Link to published version::


Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security flaws. This paper aims to explore the security vulnerabilities of IoT devices particularly that use Low Power Wide Area Networks (LPWANs). In this work, LoRaWAN based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was designed and simulated with the use of a predictive model of the device data generation. The paper demonstrated that by predicting the data generation model, jamming attack can be carried out to block devices from sending data successfully. This research will aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of IoT networks in general.

Item Type: Article
Identification Number:
Depositing User: Colin Knott
Date Deposited: 14 Jan 2020 12:01
Last Modified: 18 Mar 2021 02:52

Actions (login required)

View Item View Item


Downloads per month over past year

View more statistics