SciELO - Scientific Electronic Library Online

 
vol.22 número46Determination of Uncertainty in Measuring Instruments in Electrical Engineering ProgramsQuasi-Dynamic Analysis of a Local Distribution System with Distributed Generation. Study Case: The IEEE 13 Nodes System índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Journal

Artigo

Indicadores

Links relacionados

  • Em processo de indexaçãoCitado por Google
  • Não possue artigos similaresSimilares em SciELO
  • Em processo de indexaçãoSimilares em Google

Compartilhar


TecnoLógicas

versão impressa ISSN 0123-7799versão On-line ISSN 2256-5337

Resumo

BRAVO-MONTOYA, Andrés F.; RONDON-SANABRIA, Jefersson S.  e  GAONA-GARCI, Elvis E.. Development and Testing of a Real-Time LoRawan Sniffer Based on GNU-Radio. TecnoL. [online]. 2019, vol.22, n.46, pp.130-139. ISSN 0123-7799.  https://doi.org/10.22430/22565337.1491.

This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.

Palavras-chave : Internet of Things; Long Range Wide Area Network; Data Security; Sniffer; GNU-Radio.

        · resumo em Espanhol     · texto em Inglês     · Inglês ( pdf )