Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case

Detalhes bibliográficos
Autor(a) principal: Torres, Nuno Miguel Gramoso Rodrigues
Data de Publicação: 2022
Tipo de documento: Dissertação
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/20.500.11960/2738
Resumo: Due to its pervasive nature, the Internet of Things (IoT) is demanding for Low Power Wide Area Networks (LPWAN) since wirelessly connected devices need battery-efficient and long-range communications. By using LPWAN technologies, the IoT devices are less dependent on common infrastructures, can operate using small batteries (up to 10 years), and can be easily deployed within wide areas (above 2 km). On the other hand, LPWANbased IoT applications need to be secure since its data could contain confidential users’ information. This work provides a systematic overview regarding the security vulnerabilities that exist in LPWANs, followed by a literature review with the main goals of substantiating an attack vector analysis specifically designed for the IoT ecosystem. With the knowledge from the systematic overview, a secure LoRa-based tracking system for the BIRA bicycle was proposed. The system consists of BIRA bicycles equipped with low-cost Global Positioning (GPS) trackers. Lastly, an experimental setup was developed with a focus on hacking the Radio Frequency (RF) physical layer with Software Defined Radio (SDR) techniques, performing GPS Spoofing, Replay Attacks, Denial-of-Service (DoS) and Jamming, in an environment that relies on LoRaWAN networks. Results have shown that LPWANs contains security vulnerabilities that can lead to irreversible harm. Also, the conception and implementation of up-to-date defenses are relevant to protect systems, networks, and data. It was possible to verify that depending on the type of activation method used between the devices and the LoRaWAN server, the communications and the devices can be compromised.
id RCAP_b32b3c347dcd05ec5374b26c57802707
oai_identifier_str oai:repositorio.ipvc.pt:20.500.11960/2738
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use caseLPWANIoTCybersecurityHackingLoRaWANSmart campusSmart mobilityCibersegurançaCampus inteligenteMobilidade inteligenteDue to its pervasive nature, the Internet of Things (IoT) is demanding for Low Power Wide Area Networks (LPWAN) since wirelessly connected devices need battery-efficient and long-range communications. By using LPWAN technologies, the IoT devices are less dependent on common infrastructures, can operate using small batteries (up to 10 years), and can be easily deployed within wide areas (above 2 km). On the other hand, LPWANbased IoT applications need to be secure since its data could contain confidential users’ information. This work provides a systematic overview regarding the security vulnerabilities that exist in LPWANs, followed by a literature review with the main goals of substantiating an attack vector analysis specifically designed for the IoT ecosystem. With the knowledge from the systematic overview, a secure LoRa-based tracking system for the BIRA bicycle was proposed. The system consists of BIRA bicycles equipped with low-cost Global Positioning (GPS) trackers. Lastly, an experimental setup was developed with a focus on hacking the Radio Frequency (RF) physical layer with Software Defined Radio (SDR) techniques, performing GPS Spoofing, Replay Attacks, Denial-of-Service (DoS) and Jamming, in an environment that relies on LoRaWAN networks. Results have shown that LPWANs contains security vulnerabilities that can lead to irreversible harm. Also, the conception and implementation of up-to-date defenses are relevant to protect systems, networks, and data. It was possible to verify that depending on the type of activation method used between the devices and the LoRaWAN server, the communications and the devices can be compromised.Devido à sua natureza pervasiva, a Internet das Coisas (IoT) necessita de Redes de Baixo Consumo e Longo Alcance (LPWAN) uma vez que os dispositivos sem fios necessitam de comunicações de longo alcance e eficientes em termos de bateria. Ao utilizar as tecnologias LPWAN, os dispositivos IoT ficam menos dependentes de infra-estruturas existentes, podem funcionar com baterias pequenas (até 10 anos), e podem ser facilmente instalados em áreas amplas (acima de 2 km). Trabalhar em ambientes IoT baseados em LPWAN, faz com que aplicações críticas necessitem de ser seguras, visto que os seus dados podem conter informações confidenciais dos utilizadores. Neste trabalho é apresentada uma revisão sistemática sobre as vulnerabilidades desegurança existentes em LPWANs, seguida de uma revisão da literatura com o principal objectivo de sustentar uma análise de vetores de ataque especificamente concebida para o ecossistema IoT. Com os conhecimentos da revisão sistemática, foi proposto um sistema de localização seguro para a bicicleta BIRA, baseado em tecnologia de comunica- ções LoRaWAN. O sistema consiste em bicicletas BIRA equipadas com localizadores GPS de baixo custo. Por fim, foi implementado um conjunto de testes com foco na exploração da camada física de Rádiofrequência (RF) através de técnicas de Rádio Definido por Software (SDR), tendo sido executados vários tipos de ataques, nomeadamente GPS Spoofing, Replay Attacks, DoS and Jamming, considerando uma infraestrutura LoRaWAN de comunicações. Os resultados demonstram que as LPWAN contêm vulnerabilidades de segurança que podem levar a danos irreversíveis. Além disso, a conceções e implementação de defesas atualizadas são relevantes para proteger sistemas, redes, e dados. Foi possível verificar que, dependendo do tipo de modo de activação utilizado entre os dispositivos e o servidor LoRaWAN, as comunicações e os dispositivos podem ser comprometidos.2022-05-04T14:49:09Z2022-03-29T00:00:00Z2022-03-29info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttp://hdl.handle.net/20.500.11960/2738TID:203005058engTorres, Nuno Miguel Gramoso Rodriguesinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-04-11T08:10:23Zoai:repositorio.ipvc.pt:20.500.11960/2738Portal AgregadorONGhttps://www.rcaap.pt/oai/openairemluisa.alvim@gmail.comopendoar:71602024-04-11T08:10:23Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
title Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
spellingShingle Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
Torres, Nuno Miguel Gramoso Rodrigues
LPWAN
IoT
Cybersecurity
Hacking
LoRaWAN
Smart campus
Smart mobility
Cibersegurança
Campus inteligente
Mobilidade inteligente
title_short Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
title_full Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
title_fullStr Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
title_full_unstemmed Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
title_sort Exploring IoT security vulnerabilities in LPWANS : the IPVC BIRA bicycle use case
author Torres, Nuno Miguel Gramoso Rodrigues
author_facet Torres, Nuno Miguel Gramoso Rodrigues
author_role author
dc.contributor.author.fl_str_mv Torres, Nuno Miguel Gramoso Rodrigues
dc.subject.por.fl_str_mv LPWAN
IoT
Cybersecurity
Hacking
LoRaWAN
Smart campus
Smart mobility
Cibersegurança
Campus inteligente
Mobilidade inteligente
topic LPWAN
IoT
Cybersecurity
Hacking
LoRaWAN
Smart campus
Smart mobility
Cibersegurança
Campus inteligente
Mobilidade inteligente
description Due to its pervasive nature, the Internet of Things (IoT) is demanding for Low Power Wide Area Networks (LPWAN) since wirelessly connected devices need battery-efficient and long-range communications. By using LPWAN technologies, the IoT devices are less dependent on common infrastructures, can operate using small batteries (up to 10 years), and can be easily deployed within wide areas (above 2 km). On the other hand, LPWANbased IoT applications need to be secure since its data could contain confidential users’ information. This work provides a systematic overview regarding the security vulnerabilities that exist in LPWANs, followed by a literature review with the main goals of substantiating an attack vector analysis specifically designed for the IoT ecosystem. With the knowledge from the systematic overview, a secure LoRa-based tracking system for the BIRA bicycle was proposed. The system consists of BIRA bicycles equipped with low-cost Global Positioning (GPS) trackers. Lastly, an experimental setup was developed with a focus on hacking the Radio Frequency (RF) physical layer with Software Defined Radio (SDR) techniques, performing GPS Spoofing, Replay Attacks, Denial-of-Service (DoS) and Jamming, in an environment that relies on LoRaWAN networks. Results have shown that LPWANs contains security vulnerabilities that can lead to irreversible harm. Also, the conception and implementation of up-to-date defenses are relevant to protect systems, networks, and data. It was possible to verify that depending on the type of activation method used between the devices and the LoRaWAN server, the communications and the devices can be compromised.
publishDate 2022
dc.date.none.fl_str_mv 2022-05-04T14:49:09Z
2022-03-29T00:00:00Z
2022-03-29
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/20.500.11960/2738
TID:203005058
url http://hdl.handle.net/20.500.11960/2738
identifier_str_mv TID:203005058
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv mluisa.alvim@gmail.com
_version_ 1817543262286643200