TecnoLógicas (Sep 2019)

Development and Testing of a Real-Time LoRawan Sniffer Based on GNU-Radio

  • Andrés F. Bravo-Montoya,
  • Jefersson S. Rondón-Sanabria,
  • Elvis E. Gaona-García

DOI
https://doi.org/10.22430/22565337.1491
Journal volume & issue
Vol. 22, no. 46
pp. 185 – 194

Abstract

Read online

This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.

Keywords