skip to main content
10.1145/3384419.3430770acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

SLoRa: towards secure LoRa communications with fine-grained physical layer features

Published:16 November 2020Publication History

ABSTRACT

LoRa, which is considered as an appealing wireless technique for Low-Power Wide-Area Networks (LPWANs), has found wide applications in fields such as smart cities, intelligent agriculture. Despite its popularity, there exists a growing concern about secure communications mainly due to the free frequency band and minimalist design specified in LoRa communications. For example, an attacker can forge messages to launch spoofing attack. To mitigate the threat, an authentication mechanism is needed. In this paper, we propose a lightweight node authentication scheme named SLoRa for LoRa networks by leveraging two physical layer features-Carrier Frequency Offset (CFO) and spatial-temporal link signature. In particular, we propose a novel CFO compensation algorithm, and identify slight CFO variations by adopting linear fitting for received upchirps to mitigate the noise's randomness on fine-grained CFO estimation. Besides, we can obtain fine-grained link signatures without the conventional de-convolution operation based on the theoretical analysis. Then, we show how these two physical-layer features complement each other to conquer the drift challenge brought by weather and environment variations. Combining these two features, SLoRa can distinguish whether the received signal is conveyed from a legitimate LoRa node or not. Experiments covering indoor and outdoor scenarios are conducted to demonstrate a high accuracy for node authentication in SLoRa, which is around 97% indoors and 90% outdoors.

References

  1. Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, and Thomas Watteyne. 2017. Understanding the limits of LoRaWAN. IEEE Communications magazine 55, 9 (2017), 34--40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Marco Domenico Aime, Giorgio Calandriello, and Antonio Lioy. 2007. Dependability in wireless networks: Can we rely on WiFi? IEEE Security & Privacy 5, 1 (2007), 23--29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. 2017. Exploring the security vulnerabilities of LoRa. In 3rd IEEE International Conference on Cybernetics (CYBCONF). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  4. Aloÿs Augustin, Jiazi Yi, Thomas Clausen, and William Townsley. 2016. A study of LoRa: Long range & low power networks for the internet of things. Sensors 16, 9 (2016), 1466.Google ScholarGoogle ScholarCross RefCross Ref
  5. Bassem Bakhache, Joseph M Ghazal, and Safwan El Assad. 2013. Improvement of the security of Zigbee by a new chaotic algorithm. IEEE Systems Journal 8, 4 (2013), 1024--1033.Google ScholarGoogle ScholarCross RefCross Ref
  6. Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. 2008. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking. ACM, 116--127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ismail Butun, Nuno Pereira, and Mikael Gidlund. 2018. Analysis of LoRaWAN v1. 1 security. In Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects. ACM, 5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gayathri Chandrasekaran, John Austen Francisco, Vinod Ganapathy, Marco Gruteser, and Wade Trappe. 2009. Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. In Global Telecommunications Conference.Google ScholarGoogle ScholarCross RefCross Ref
  9. Gianluca Dini and Marco Tiloca. 2010. Considerations on security in Zigbee networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, 58--65.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Adwait Dongare, Craig Hesling, Khushboo Bhatia, Artur Balanuta, Ricardo Lopes Pereira, Bob Iannucci, and Anthony Rowe. 2017. OpenChirp: A low-power wide-area networking architecture. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 569--574.Google ScholarGoogle ScholarCross RefCross Ref
  11. Rashad Eletreby, Diana Zhang, Swarun Kumar, and Osman Yağan. 2017. Empowering low-power wide area networks in urban settings. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM, 309--321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Song Fang, Yao Liu, Wenbo Shen, and Haojin Zhu. 2014. Where are you from?: confusing location distinction using virtual multipath camouflage. In Proceedings of the 20th annual international conference on Mobile computing and networking. ACM, 225--236.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Branden Ghena, Joshua Adkins, Longfei Shangguan, Kyle Jamieson, Philip Levis, and Prabal Dutta. 2019. Challenge: Unlicensed LPWANs Are Not Yet the Path to Ubiquitous Connectivity. In The 25th Annual International Conference on Mobile Computing and Networking. ACM, 43--55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chaojie Gu, Jiang Linshan, Tan Rui, Li Mo, and Huang Jun. [n. d.]. Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN. arXiv preprint arXiv.Google ScholarGoogle Scholar
  15. Ari Juels et al. 2006. RFID security and privacy: A research survey. IEEE journal on selected areas in communications 24, 2 (2006), 381--394.Google ScholarGoogle Scholar
  16. Min Qiang Li, Xian He Huang, Feng Tan, Yan Hong Fan, and Xun Liang. [n. d.]. A novel microcomputer temperature-compensating method for an overtone crystal oscillator. IEEE Transactions on Ultrasonics Ferroelectrics & Frequency Control 52, 11 ([n. d.]), 1919--1922.Google ScholarGoogle Scholar
  17. Ticyan Li and Guilin Wang. 2007. Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP international information security conference. Springer, 109--120.Google ScholarGoogle Scholar
  18. Yao Liu and Peng Ning. 2012. Enhanced wireless channel authentication using time-synched link signature. In INFOCOM. IEEE.Google ScholarGoogle Scholar
  19. Yao Liu, Peng Ning, and Huaiyu Dai. 2010. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. In Symposium on Security and Privacy. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Zhiqing Luo, Wei Wang, Jun Qu, Tao Jiang, and Qian Zhang. 2018. ShieldScatter: Improving IoT Security with Backscatter Assistance. In Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems. ACM, 185--198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Marwa Mamoun. 2014. Software Defined Radio. (2014).Google ScholarGoogle Scholar
  22. Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, and James Bret Michael. 2012. Securing the ZigBee protocol in the smart grid. Computer 45, 4 (2012), 92--94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Son Thanh Nguyen and Chunming Rong. 2007. Zigbee security using identity-based cryptography. In International Conference on Autonomic and Trusted Computing. Springer, 3--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Neal Patwari and Sneha K Kasera. 2007. Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, 111--122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Yao Peng, Longfei Shangguan, Yue Hu, Yujie Qian, Xianshang Lin, Xiaojiang Chen, Dingyi Fang, and Kyle Jamieson. 2018. PLoRa: A passive long-range data network from ambient LoRa transmissions. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM, 147--160.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Melanie R Rieback, Bruno Crispo, and Andrew S Tanenbaum. 2006. The evolution of RFID security. IEEE Pervasive Computing 1 (2006), 62--69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, and Bart Preneel. 2017. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 58--63.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Nils Miro Rodday, Ricardo de O Schmidt, and Aiko Pras. 2016. Exploring security vulnerabilities of unmanned aerial vehicles. In IEEE/IFIP Network Operations and Management Symposium. IEEE, 993--994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Rupul Safaya. 1997. A multipath channel estimation algorithm using a kalman filter. Diss. University of Kansas (1997).Google ScholarGoogle Scholar
  30. Vamsi Talla, Mehrdad Hessar, Bryce Kellogg, Ali Najafi, Joshua R Smith, and Shyamnath Gollakota. 2017. LoRa backscatter: Enabling the vision of ubiquitous connectivity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 105.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Chiu C Tan, Bo Sheng, and Qun Li. 2008. Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications 7, 4 (2008), 1400--1407.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. JP Tomás. 2018. Operators in Korea, Netherlands deploy LoRa networks for IoT 2016.Google ScholarGoogle Scholar
  33. Stefano Tomasin, Simone Zulian, and Lorenzo Vangelista. 2017. Security analysis of LoRaWAN join procedure for Internet of Things networks. In Wireless Communications and Networking Conference Workshops. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  34. Beibei Wang, Yongle Wu, Feng Han, Yu-Han Yang, and KJ Ray Liu. 2011. Green wireless communications: A time-reversal paradigm. IEEE Journal on Selected Areas in Communications 29, 8 (2011), 1698--1710.Google ScholarGoogle ScholarCross RefCross Ref
  35. Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, Han Ding, and Jizhong Zhao. 2018. Towards replay-resilient RFID authentication. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 385--399.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Wei Wang, Lin Yang, Qian Zhang, and Tao Jiang. 2018. Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation. IEEE Journal on Selected Areas in Communications (2018), 696--703.Google ScholarGoogle ScholarCross RefCross Ref
  37. Jie Xiong and Kyle Jamieson. 2013. SecureArray: Improving WiFi security with fine-grained physical-layer information. In Proceedings of the 19th annual international conference on Mobile computing & networking. ACM, 441--452.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Weitao Xu, Sanjay Jha, and Wen Hu. 2018. LoRa-key: Secure key generation system for LoRa-based network. IEEE Internet of Things Journal (2018).Google ScholarGoogle Scholar
  39. Xueying Yang, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. 2018. Security Vulnerabilities in LoRaWAN. In IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation. IEEE, 129--140.Google ScholarGoogle Scholar
  40. Asif M Yousuf, Edward M Rochester, Behnam Ousat, and Majid Ghaderi. 2018. Throughput, Coverage and Scalability of LoRa LPWAN for Internet of Things. In IEEE/ACM 26th International Symposium on Quality of Service. IEEE, 1--10.Google ScholarGoogle Scholar
  41. Junxing Zhang, Mohammad Hamed Firooz, Neal Patwari, and Sneha Kumar Kasera. 2008. Advancing wireless link signatures for location distinction. In ACM International Conference on Mobile Computing & Networking. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. SLoRa: towards secure LoRa communications with fine-grained physical layer features

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SenSys '20: Proceedings of the 18th Conference on Embedded Networked Sensor Systems
      November 2020
      852 pages
      ISBN:9781450375900
      DOI:10.1145/3384419

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 November 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate174of867submissions,20%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader