Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/23366
Title: | Exploring Communication Features and Security Vulnerabilities of Long-Range (LoRa) Networks | Authors: | Panagi, Andreas | Keywords: | IoT;LPWAN;LoRa;Vulnerabilities;Communication Features | Advisor: | Lambrinos, Lambros | Issue Date: | May-2021 | Department: | Department of Communication and Internet Studies | Faculty: | Faculty of Communication and Internet Studies | Abstract: | Internet of Things (IoT) comprises devices that can communicate with each other and the computing infrastructure. IoT devices are used mostly for automatization, they gather information, analyze it, and create an action. LPWAN is a networking infrastructure solution for the Internet of Things. It is a relatively new class of wireless communication systems designed for long-range and low-power performance meaning they transmit data slower but with long-range and low battery usage. There are several LPWAN protocols, such as SigFox, DASH7, NB-IoT, and LoRaWAN. LoRaWAN is gaining a lot of traction from the manufacturing and academic communities due to its low implementation costs and scalable network-layer protocols. For this thesis, we have focused on the LoRaWAN protocol. It has seen fast acceptance in the world of IoT since its introduction in 2015. However, since LoRaWAN is still relatively new, its extent of protection has not been thoroughly researched. The main objective of this thesis is the examination of the LoRaWAN operations and the security features, namely activation methods, security keys, protocol architecture, and security architecture. Additionally, the range and coverage of LoRa devices manufactured by the “The Things Network” community have been tested. Furthermore, we have discovered and analyzed a few vulnerabilities of LoRaWAN. Experimental validation for each attack has been executed in a controlled environment and with the use of references. Finally, we have discussed the best practices for better connectivity between the sensors and gateways and how these attacks can be mitigated or protected against. | URI: | https://hdl.handle.net/20.500.14279/23366 | Rights: | Απαγορεύεται η δημοσίευση ή αναπαραγωγή, ηλεκτρονική ή άλλη χωρίς τη γραπτή συγκατάθεση του δημιουργού και κάτοχου των πνευματικών δικαιωμάτων. | Type: | Bachelors Thesis | Affiliation: | Cyprus University of Technology |
Appears in Collections: | Πτυχιακές Εργασίες/ Bachelor's Degree Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Abstract AndreasPanagi_Thesis(Final).pdf | 56.31 kB | Adobe PDF | View/Open |
CORE Recommender
Page view(s) 50
217
Last Week
0
0
Last month
19
19
checked on Nov 6, 2024
Download(s) 50
138
checked on Nov 6, 2024
Google ScholarTM
Check
This item is licensed under a Creative Commons License