LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in turn, redirect the data to application servers. While several security issues have been faced in the LoRaWAN v1.1 specification from the very beginning, there are still some aspects that may undermine the privacy and the security of the IoT devices. In this paper we tackle the privacy aspect in the LoRaWAN device identity. The proposed approach, by monitoring the traffic of a LoRaWAN Network, is able to derive, in a probabilistic way, the unique identifier of the device from the temporal address assigned from the network. In other words, the method identifies the relationship between the LoRaWAN DevAddress and the device manufacturer DevEUI. The proposed approach, named DEVIL (DEVice Identification and privacy Leakage), is based on temporal patterns arising in the packet transmissions by LoRaWAN devices, and it is evaluated on the dataset extracted from real applications scenario deployed in Italy by a network operator. The results of our analysis show how device identification, during the time, can expose users to privacy leakage.

Spadaccino P., Garlisi D., Cuomo F., Pillon G., Pisani P. (2021). Discovery privacy threats via device de-anonymization in LoRaWAN. In 2021 19th Mediterranean Communication and Computer Networking Conference, MedComNet 2021 (pp. 1-8). Institute of Electrical and Electronics Engineers Inc. [10.1109/MEDCOMNET52149.2021.9501247].

Discovery privacy threats via device de-anonymization in LoRaWAN

Garlisi D.
;
2021-01-01

Abstract

LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in turn, redirect the data to application servers. While several security issues have been faced in the LoRaWAN v1.1 specification from the very beginning, there are still some aspects that may undermine the privacy and the security of the IoT devices. In this paper we tackle the privacy aspect in the LoRaWAN device identity. The proposed approach, by monitoring the traffic of a LoRaWAN Network, is able to derive, in a probabilistic way, the unique identifier of the device from the temporal address assigned from the network. In other words, the method identifies the relationship between the LoRaWAN DevAddress and the device manufacturer DevEUI. The proposed approach, named DEVIL (DEVice Identification and privacy Leakage), is based on temporal patterns arising in the packet transmissions by LoRaWAN devices, and it is evaluated on the dataset extracted from real applications scenario deployed in Italy by a network operator. The results of our analysis show how device identification, during the time, can expose users to privacy leakage.
2021
978-1-6654-3590-1
Spadaccino P., Garlisi D., Cuomo F., Pillon G., Pisani P. (2021). Discovery privacy threats via device de-anonymization in LoRaWAN. In 2021 19th Mediterranean Communication and Computer Networking Conference, MedComNet 2021 (pp. 1-8). Institute of Electrical and Electronics Engineers Inc. [10.1109/MEDCOMNET52149.2021.9501247].
File in questo prodotto:
File Dimensione Formato  
Discovery_privacy_threats_via_device_de-anonymization_in_LoRaWAN.pdf

Solo gestori archvio

Tipologia: Versione Editoriale
Dimensione 1.45 MB
Formato Adobe PDF
1.45 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10447/548746
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 3
social impact