{"title":"基于深度学习的LoRaWAN模块侧信道攻击","authors":"Jiming Xu, You Tang, Yujian Wang, Xinan Wang","doi":"10.1109/ICASID.2019.8925203","DOIUrl":null,"url":null,"abstract":"With the development of Internet-of-Things technology, the electronic devices nowadays are embedded with “smart” functionalities, which enable them to upload data to the cloud for the easy access of the users. Such functionalities have been popular among commercial products. However, as we shall show in this paper, these functionalities, if not protected properly, can be vulnerable to attacks. An unprotected implementation leaks significant level of information related to the sensitive operations, which could pose threats to the security of the device. In this paper, we demonstrate a practical attack against a LoRaWAN communication module. This attack uses the deep-learning-based side-channel attack to recover the key for encrypting the payload data. By capturing less than 100 communication packets, the trained convolutional neural network is capable of recovering the full key for AES encryption.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning\",\"authors\":\"Jiming Xu, You Tang, Yujian Wang, Xinan Wang\",\"doi\":\"10.1109/ICASID.2019.8925203\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of Internet-of-Things technology, the electronic devices nowadays are embedded with “smart” functionalities, which enable them to upload data to the cloud for the easy access of the users. Such functionalities have been popular among commercial products. However, as we shall show in this paper, these functionalities, if not protected properly, can be vulnerable to attacks. An unprotected implementation leaks significant level of information related to the sensitive operations, which could pose threats to the security of the device. In this paper, we demonstrate a practical attack against a LoRaWAN communication module. This attack uses the deep-learning-based side-channel attack to recover the key for encrypting the payload data. By capturing less than 100 communication packets, the trained convolutional neural network is capable of recovering the full key for AES encryption.\",\"PeriodicalId\":422125,\"journal\":{\"name\":\"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASID.2019.8925203\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2019.8925203","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning
With the development of Internet-of-Things technology, the electronic devices nowadays are embedded with “smart” functionalities, which enable them to upload data to the cloud for the easy access of the users. Such functionalities have been popular among commercial products. However, as we shall show in this paper, these functionalities, if not protected properly, can be vulnerable to attacks. An unprotected implementation leaks significant level of information related to the sensitive operations, which could pose threats to the security of the device. In this paper, we demonstrate a practical attack against a LoRaWAN communication module. This attack uses the deep-learning-based side-channel attack to recover the key for encrypting the payload data. By capturing less than 100 communication packets, the trained convolutional neural network is capable of recovering the full key for AES encryption.