ABSTRACT
LoRa, which is considered as an appealing wireless technique for Low-Power Wide-Area Networks (LPWANs), has found wide applications in fields such as smart cities, intelligent agriculture. Despite its popularity, there exists a growing concern about secure communications mainly due to the free frequency band and minimalist design specified in LoRa communications. For example, an attacker can forge messages to launch spoofing attack. To mitigate the threat, an authentication mechanism is needed. In this paper, we propose a lightweight node authentication scheme named SLoRa for LoRa networks by leveraging two physical layer features-Carrier Frequency Offset (CFO) and spatial-temporal link signature. In particular, we propose a novel CFO compensation algorithm, and identify slight CFO variations by adopting linear fitting for received upchirps to mitigate the noise's randomness on fine-grained CFO estimation. Besides, we can obtain fine-grained link signatures without the conventional de-convolution operation based on the theoretical analysis. Then, we show how these two physical-layer features complement each other to conquer the drift challenge brought by weather and environment variations. Combining these two features, SLoRa can distinguish whether the received signal is conveyed from a legitimate LoRa node or not. Experiments covering indoor and outdoor scenarios are conducted to demonstrate a high accuracy for node authentication in SLoRa, which is around 97% indoors and 90% outdoors.
- Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, and Thomas Watteyne. 2017. Understanding the limits of LoRaWAN. IEEE Communications magazine 55, 9 (2017), 34--40.Google Scholar
Digital Library
- Marco Domenico Aime, Giorgio Calandriello, and Antonio Lioy. 2007. Dependability in wireless networks: Can we rely on WiFi? IEEE Security & Privacy 5, 1 (2007), 23--29.Google Scholar
Digital Library
- Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. 2017. Exploring the security vulnerabilities of LoRa. In 3rd IEEE International Conference on Cybernetics (CYBCONF). IEEE, 1--6.Google Scholar
Cross Ref
- Aloÿs Augustin, Jiazi Yi, Thomas Clausen, and William Townsley. 2016. A study of LoRa: Long range & low power networks for the internet of things. Sensors 16, 9 (2016), 1466.Google Scholar
Cross Ref
- Bassem Bakhache, Joseph M Ghazal, and Safwan El Assad. 2013. Improvement of the security of Zigbee by a new chaotic algorithm. IEEE Systems Journal 8, 4 (2013), 1024--1033.Google Scholar
Cross Ref
- Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. 2008. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking. ACM, 116--127.Google Scholar
Digital Library
- Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2018. Analysis of LoRaWAN v1. 1 security. In Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects. ACM, 5.Google Scholar
Digital Library
- Gayathri Chandrasekaran, John Austen Francisco, Vinod Ganapathy, Marco Gruteser, and Wade Trappe. 2009. Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. In Global Telecommunications Conference.Google Scholar
Cross Ref
- Gianluca Dini and Marco Tiloca. 2010. Considerations on security in Zigbee networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, 58--65.Google Scholar
Digital Library
- Adwait Dongare, Craig Hesling, Khushboo Bhatia, Artur Balanuta, Ricardo Lopes Pereira, Bob Iannucci, and Anthony Rowe. 2017. OpenChirp: A low-power wide-area networking architecture. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 569--574.Google Scholar
Cross Ref
- Rashad Eletreby, Diana Zhang, Swarun Kumar, and Osman Yağan. 2017. Empowering low-power wide area networks in urban settings. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM, 309--321.Google Scholar
Digital Library
- Song Fang, Yao Liu, Wenbo Shen, and Haojin Zhu. 2014. Where are you from?: confusing location distinction using virtual multipath camouflage. In Proceedings of the 20th annual international conference on Mobile computing and networking. ACM, 225--236.Google Scholar
Digital Library
- Branden Ghena, Joshua Adkins, Longfei Shangguan, Kyle Jamieson, Philip Levis, and Prabal Dutta. 2019. Challenge: Unlicensed LPWANs Are Not Yet the Path to Ubiquitous Connectivity. In The 25th Annual International Conference on Mobile Computing and Networking. ACM, 43--55.Google Scholar
Digital Library
- Chaojie Gu, Jiang Linshan, Tan Rui, Li Mo, and Huang Jun. [n. d.]. Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN. arXiv preprint arXiv.Google Scholar
- Ari Juels et al. 2006. RFID security and privacy: A research survey. IEEE journal on selected areas in communications 24, 2 (2006), 381--394.Google Scholar
- Min Qiang Li, Xian He Huang, Feng Tan, Yan Hong Fan, and Xun Liang. [n. d.]. A novel microcomputer temperature-compensating method for an overtone crystal oscillator. IEEE Transactions on Ultrasonics Ferroelectrics & Frequency Control 52, 11 ([n. d.]), 1919--1922.Google Scholar
- Ticyan Li and Guilin Wang. 2007. Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP international information security conference. Springer, 109--120.Google Scholar
- Yao Liu and Peng Ning. 2012. Enhanced wireless channel authentication using time-synched link signature. In INFOCOM. IEEE.Google Scholar
- Yao Liu, Peng Ning, and Huaiyu Dai. 2010. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. In Symposium on Security and Privacy. IEEE.Google Scholar
Digital Library
- Zhiqing Luo, Wei Wang, Jun Qu, Tao Jiang, and Qian Zhang. 2018. ShieldScatter: Improving IoT Security with Backscatter Assistance. In Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems. ACM, 185--198.Google Scholar
Digital Library
- Marwa Mamoun. 2014. Software Defined Radio. (2014).Google Scholar
- Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, and James Bret Michael. 2012. Securing the ZigBee protocol in the smart grid. Computer 45, 4 (2012), 92--94.Google Scholar
Digital Library
- Son Thanh Nguyen and Chunming Rong. 2007. Zigbee security using identity-based cryptography. In International Conference on Autonomic and Trusted Computing. Springer, 3--12.Google Scholar
Digital Library
- Neal Patwari and Sneha K Kasera. 2007. Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, 111--122.Google Scholar
Digital Library
- Yao Peng, Longfei Shangguan, Yue Hu, Yujie Qian, Xianshang Lin, Xiaojiang Chen, Dingyi Fang, and Kyle Jamieson. 2018. PLoRa: A passive long-range data network from ambient LoRa transmissions. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM, 147--160.Google Scholar
Digital Library
- Melanie R Rieback, Bruno Crispo, and Andrew S Tanenbaum. 2006. The evolution of RFID security. IEEE Pervasive Computing 1 (2006), 62--69.Google Scholar
Digital Library
- Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, and Bart Preneel. 2017. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 58--63.Google Scholar
Digital Library
- Nils Miro Rodday, Ricardo de O Schmidt, and Aiko Pras. 2016. Exploring security vulnerabilities of unmanned aerial vehicles. In IEEE/IFIP Network Operations and Management Symposium. IEEE, 993--994.Google Scholar
Digital Library
- Rupul Safaya. 1997. A multipath channel estimation algorithm using a kalman filter. Diss. University of Kansas (1997).Google Scholar
- Vamsi Talla, Mehrdad Hessar, Bryce Kellogg, Ali Najafi, Joshua R Smith, and Shyamnath Gollakota. 2017. LoRa backscatter: Enabling the vision of ubiquitous connectivity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 105.Google Scholar
Digital Library
- Chiu C Tan, Bo Sheng, and Qun Li. 2008. Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications 7, 4 (2008), 1400--1407.Google Scholar
Digital Library
- JP Tomás. 2018. Operators in Korea, Netherlands deploy LoRa networks for IoT 2016.Google Scholar
- Stefano Tomasin, Simone Zulian, and Lorenzo Vangelista. 2017. Security analysis of LoRaWAN join procedure for Internet of Things networks. In Wireless Communications and Networking Conference Workshops. IEEE, 1--6.Google Scholar
Cross Ref
- Beibei Wang, Yongle Wu, Feng Han, Yu-Han Yang, and KJ Ray Liu. 2011. Green wireless communications: A time-reversal paradigm. IEEE Journal on Selected Areas in Communications 29, 8 (2011), 1698--1710.Google Scholar
Cross Ref
- Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, Han Ding, and Jizhong Zhao. 2018. Towards replay-resilient RFID authentication. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 385--399.Google Scholar
Digital Library
- Wei Wang, Lin Yang, Qian Zhang, and Tao Jiang. 2018. Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation. IEEE Journal on Selected Areas in Communications (2018), 696--703.Google Scholar
Cross Ref
- Jie Xiong and Kyle Jamieson. 2013. SecureArray: Improving WiFi security with fine-grained physical-layer information. In Proceedings of the 19th annual international conference on Mobile computing & networking. ACM, 441--452.Google Scholar
Digital Library
- Weitao Xu, Sanjay Jha, and Wen Hu. 2018. LoRa-key: Secure key generation system for LoRa-based network. IEEE Internet of Things Journal (2018).Google Scholar
- Xueying Yang, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. 2018. Security Vulnerabilities in LoRaWAN. In IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation. IEEE, 129--140.Google Scholar
- Asif M Yousuf, Edward M Rochester, Behnam Ousat, and Majid Ghaderi. 2018. Throughput, Coverage and Scalability of LoRa LPWAN for Internet of Things. In IEEE/ACM 26th International Symposium on Quality of Service. IEEE, 1--10.Google Scholar
- Junxing Zhang, Mohammad Hamed Firooz, Neal Patwari, and Sneha Kumar Kasera. 2008. Advancing wireless link signatures for location distinction. In ACM International Conference on Mobile Computing & Networking. ACM.Google Scholar
Digital Library
Index Terms
SLoRa: towards secure LoRa communications with fine-grained physical layer features
Recommendations
Applying OOK modulation in OFDM to reduce the ICI due to CFO and IQ imbalance
Orthogonal frequency division multiplexing (OFDM) has become one of the promising technologies for the next-generation communications systems to support high-speed high-quality digital transmission and reception. However, conventional OFDM systems are ...
Permutated OOK-QPSK in OFDM to reduce the ICI due to carrier frequency offset
IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computingOrthogonal Frequency Division Multiplexing (OFDM) has attracted significant interests in wireless communications due to its robustness against multi-path fading and high-data-rate transmission. However, conventional OFDM systems are sensitive to the ...
Evaluation of Conventional and Wavelet Based OFDM System for ICI Cancellation
Orthogonal frequency division multiplexing (OFDM) is used for high speed communication but carrier frequency offset (CFO) creates problem in the working of OFDM and introduces loss of orthogonality between the subcarriers and gives rise to Inter Carrier ...





Comments