Services on Demand
Journal
Article
Indicators
- Cited by SciELO
- Access statistics
Related links
- Cited by Google
- Similars in SciELO
- Similars in Google
Share
TecnoLógicas
Print version ISSN 0123-7799On-line version ISSN 2256-5337
Abstract
BRAVO-MONTOYA, Andrés F.; RONDON-SANABRIA, Jefersson S. and GAONA-GARCI, Elvis E.. Development and Testing of a Real-Time LoRawan Sniffer Based on GNU-Radio. TecnoL. [online]. 2019, vol.22, n.46, pp.130-139. ISSN 0123-7799. https://doi.org/10.22430/22565337.1491.
This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.
Keywords : Internet of Things; Long Range Wide Area Network; Data Security; Sniffer; GNU-Radio.