Please use this identifier to cite or link to this item: http://hdl.handle.net/1893/30621
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIngham, Maxen_UK
dc.contributor.authorMarchang, Jimsen_UK
dc.contributor.authorBhowmik, Deepayanen_UK
dc.date.accessioned2020-01-15T01:00:17Z-
dc.date.available2020-01-15T01:00:17Z-
dc.date.issued2020-07en_UK
dc.identifier.urihttp://hdl.handle.net/1893/30621-
dc.description.abstractInternet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security flaws. This paper aims to explore the security vulnerabilities of IoT devices particularly that use Low Power Wide Area Networks (LPWANs). In this work, LoRaWAN based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was designed and simulated with the use of a predictive model of the device data generation. The paper demonstrated that by predicting the data generation model, jamming attack can be carried out to block devices from sending data successfully. This research will aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of IoT networks in general.en_UK
dc.language.isoenen_UK
dc.publisherInstitution of Engineering and Technologyen_UK
dc.relationIngham M, Marchang J & Bhowmik D (2020) IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN. IET Information Security, 14 (4), pp. 368-379. https://doi.org/10.1049/iet-ifs.2019.0447en_UK
dc.rightsThis paper is a postprint of a paper submitted to and accepted for publication in IET Information Security and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library.en_UK
dc.subjectwide area networksen_UK
dc.subjectjammingen_UK
dc.subjectInternet of Thingsen_UK
dc.subjectcomputer network securityen_UK
dc.titleIoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWANen_UK
dc.typeJournal Articleen_UK
dc.identifier.doi10.1049/iet-ifs.2019.0447en_UK
dc.citation.jtitleIET Information Securityen_UK
dc.citation.issn1751-8717en_UK
dc.citation.issn1751-8709en_UK
dc.citation.volume14en_UK
dc.citation.issue4en_UK
dc.citation.spage368en_UK
dc.citation.epage379en_UK
dc.citation.publicationstatusPublisheden_UK
dc.citation.peerreviewedRefereeden_UK
dc.type.statusAM - Accepted Manuscripten_UK
dc.author.emaildeepayan.bhowmik@stir.ac.uken_UK
dc.citation.date10/01/2020en_UK
dc.contributor.affiliationSheffield Hallam Universityen_UK
dc.contributor.affiliationSheffield Hallam Universityen_UK
dc.contributor.affiliationComputing Scienceen_UK
dc.identifier.isiWOS:000545611500002en_UK
dc.identifier.scopusid2-s2.0-85087076596en_UK
dc.identifier.wtid1506919en_UK
dc.contributor.orcid0000-0003-1762-1578en_UK
dc.date.accepted2020-01-08en_UK
dcterms.dateAccepted2020-01-08en_UK
dc.date.filedepositdate2020-01-14en_UK
rioxxterms.apcnot requireden_UK
rioxxterms.typeJournal Article/Reviewen_UK
rioxxterms.versionAMen_UK
local.rioxx.authorIngham, Max|en_UK
local.rioxx.authorMarchang, Jims|en_UK
local.rioxx.authorBhowmik, Deepayan|0000-0003-1762-1578en_UK
local.rioxx.projectInternal Project|University of Stirling|https://isni.org/isni/0000000122484331en_UK
local.rioxx.freetoreaddate2020-01-14en_UK
local.rioxx.licencehttp://www.rioxx.net/licenses/all-rights-reserved|2020-01-14|en_UK
local.rioxx.filenameLoRa-Sec-Revised.pdfen_UK
local.rioxx.filecount1en_UK
local.rioxx.source1751-8717en_UK
Appears in Collections:Computing Science and Mathematics Journal Articles

Files in This Item:
File Description SizeFormat 
LoRa-Sec-Revised.pdfFulltext - Accepted Version1.54 MBAdobe PDFView/Open


This item is protected by original copyright



Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/

If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.