Servicios Personalizados
Revista
Articulo
Indicadores
- Citado por SciELO
- Accesos
Links relacionados
- Citado por Google
- Similares en SciELO
- Similares en Google
Compartir
TecnoLógicas
versión impresa ISSN 0123-7799versión On-line ISSN 2256-5337
Resumen
BRAVO-MONTOYA, Andrés F.; RONDON-SANABRIA, Jefersson S. y GAONA-GARCI, Elvis E.. Development and Testing of a Real-Time LoRawan Sniffer Based on GNU-Radio. TecnoL. [online]. 2019, vol.22, n.46, pp.130-139. ISSN 0123-7799. https://doi.org/10.22430/22565337.1491.
This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.
Palabras clave : Internet of Things; Long Range Wide Area Network; Data Security; Sniffer; GNU-Radio.