{"title":"通过流量流分析实现LoRaWAN设备的隐私监控","authors":"Francesco Terenzi, Pietro Spadaccino, F. Cuomo","doi":"10.1109/WoWMoM54355.2022.00062","DOIUrl":null,"url":null,"abstract":"LoRaWAN is a wireless technology developed to transmit over long distances using low power. It runs over the proprietary LoRa radio modulation and provides fundamental IoT requirements such as bi-directional communication, end-to-end security, key management, mobility, and localization services. Despite LoRaWAN guarantees confidentiality and integrity of application payload, the wireless nature of the medium causes that an eavesdropper, listening to the network communications, can collect non-encrypted information stored in the packets. In particular, it can obtain two sensible metadata elements, called DevAddress e DevEUI. Since the association between these elements can involve privacy issues, LoRaWAN forces endpoints to expose their DevEUI only during the association procedure to avoid the association with the corresponding DevAddress. In the first part of this work, we prove how an adversary can link them nevertheless. Then we explain the consequences for the privacy of devices and users that joined the network and propose PIVOT (Privacy-Monitoring), an analyzer system for LoRaWAN that detects in real-time vulnerable endpoints. Furthermore, we explain how the metrics used in PIVOT can support the operator in applying adequate countermeasures. Finally, we test our scheme on a simulated LoRaWAN application and examine the results obtained.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy monitoring of LoRaWAN devices through traffic stream analysis\",\"authors\":\"Francesco Terenzi, Pietro Spadaccino, F. Cuomo\",\"doi\":\"10.1109/WoWMoM54355.2022.00062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"LoRaWAN is a wireless technology developed to transmit over long distances using low power. It runs over the proprietary LoRa radio modulation and provides fundamental IoT requirements such as bi-directional communication, end-to-end security, key management, mobility, and localization services. Despite LoRaWAN guarantees confidentiality and integrity of application payload, the wireless nature of the medium causes that an eavesdropper, listening to the network communications, can collect non-encrypted information stored in the packets. In particular, it can obtain two sensible metadata elements, called DevAddress e DevEUI. Since the association between these elements can involve privacy issues, LoRaWAN forces endpoints to expose their DevEUI only during the association procedure to avoid the association with the corresponding DevAddress. In the first part of this work, we prove how an adversary can link them nevertheless. Then we explain the consequences for the privacy of devices and users that joined the network and propose PIVOT (Privacy-Monitoring), an analyzer system for LoRaWAN that detects in real-time vulnerable endpoints. Furthermore, we explain how the metrics used in PIVOT can support the operator in applying adequate countermeasures. Finally, we test our scheme on a simulated LoRaWAN application and examine the results obtained.\",\"PeriodicalId\":275324,\"journal\":{\"name\":\"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WoWMoM54355.2022.00062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WoWMoM54355.2022.00062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy monitoring of LoRaWAN devices through traffic stream analysis
LoRaWAN is a wireless technology developed to transmit over long distances using low power. It runs over the proprietary LoRa radio modulation and provides fundamental IoT requirements such as bi-directional communication, end-to-end security, key management, mobility, and localization services. Despite LoRaWAN guarantees confidentiality and integrity of application payload, the wireless nature of the medium causes that an eavesdropper, listening to the network communications, can collect non-encrypted information stored in the packets. In particular, it can obtain two sensible metadata elements, called DevAddress e DevEUI. Since the association between these elements can involve privacy issues, LoRaWAN forces endpoints to expose their DevEUI only during the association procedure to avoid the association with the corresponding DevAddress. In the first part of this work, we prove how an adversary can link them nevertheless. Then we explain the consequences for the privacy of devices and users that joined the network and propose PIVOT (Privacy-Monitoring), an analyzer system for LoRaWAN that detects in real-time vulnerable endpoints. Furthermore, we explain how the metrics used in PIVOT can support the operator in applying adequate countermeasures. Finally, we test our scheme on a simulated LoRaWAN application and examine the results obtained.