01/27/2021 1:30pm
01/27/2021 1:45pm
Wednesday 27 January 2021
04:30 am - 04:45 am PT
IoT has been adopted by many application areas including manufacturing, “smart” cities, tracking, and other use cases, and has been within attacker’s reach for some time. Chosen for their far-reaching, LPWAN technologies such as NB-IoT, Zigbee, Sigox, but also LoRa play a big role in connecting these IoT devices.
In this presentation, we will introduce practical radio attacks on the LoRaWAN protocol and its stack. To start the presentation, we will shortly be speaking about previous research and challenges to overcome some limitations encountered in the past when attacking these technologies. Then, we will introduce and demonstrate our tools to assess radio communications, but also to investigate further when looking for new vulnerabilities. In the end, we will conclude with the security measures we must take in place to protect from these attacks.
Wednesday 27 January 2021
11:30 pm - 11:45 pm CET
01/27/2021 02:30 pm
01/27/2021 02:45 pm
IoT has been adopted by many application areas including manufacturing, “smart” cities, tracking, and other use cases, and has been within attacker’s reach for some time. Chosen for their far-reaching, LPWAN technologies such as NB-IoT, Zigbee, Sigox, but also LoRa play a big role in connecting these IoT devices.
In this presentation, we will introduce practical radio attacks on the LoRaWAN protocol and its stack. To start the presentation, we will shortly be speaking about previous research and challenges to overcome some limitations encountered in the past when attacking these technologies. Then, we will introduce and demonstrate our tools to assess radio communications, but also to investigate further when looking for new vulnerabilities. In the end, we will conclude with the security measures we must take in place to protect from these attacks.
IoT has been adopted by many application areas including manufacturing, “smart” cities, tracking, and other use cases, and has been within attacker’s reach for some time. Chosen for their far-reaching, LPWAN technologies such as NB-IoT, Zigbee, Sigox, but also LoRa play a big role in connecting these IoT devices.
In this presentation, we will introduce practical radio attacks on the LoRaWAN protocol and its stack. To start the presentation, we will shortly be speaking about previous research and challenges to overcome some limitations encountered in the past when attacking these technologies. Then, we will introduce and demonstrate our tools to assess radio communications, but also to investigate further when looking for new vulnerabilities. In the end, we will conclude with the security measures we must take in place to protect from these attacks.
Become part of The Things Conference and get in touch with tens of thousands of LoRaWAN professionals.
Reach out