LoRaPWNing: Practical Radio Attacks on LoRaWAN

When

01/27/2021 1:30pm

Wednesday 27 January 2021
04:30 am - 04:45 am PT

Add to Calendar 01/27/2021 1:30pm 01/27/2021 1:45pm Europe/Paris LoRaPWNing: Practical Radio Attacks on LoRaWAN

IoT has been adopted by many application areas including manufacturing, “smart” cities, tracking, and other use cases, and has been within attacker’s reach for some time. Chosen for their far-reaching, LPWAN technologies such as NB-IoT, Zigbee, Sigox, but also LoRa play a big role in connecting these IoT devices.

In this presentation, we will introduce practical radio attacks on the LoRaWAN protocol and its stack. To start the presentation, we will shortly be speaking about previous research and challenges to overcome some limitations encountered in the past when attacking these technologies. Then, we will introduce and demonstrate our tools to assess radio communications, but also to investigate further when looking for new vulnerabilities. In the end, we will conclude with the security measures we must take in place to protect from these attacks.

Wednesday 27 January 2021
11:30 pm - 11:45 pm CET

01/27/2021 02:30 pm

Add to Calendar Wednesday 27 January 2021 11:30 pm Wednesday 27 January 2021 11:45 pm Europe/Paris LoRaPWNing: Practical Radio Attacks on LoRaWAN

IoT has been adopted by many application areas including manufacturing, “smart” cities, tracking, and other use cases, and has been within attacker’s reach for some time. Chosen for their far-reaching, LPWAN technologies such as NB-IoT, Zigbee, Sigox, but also LoRa play a big role in connecting these IoT devices.

In this presentation, we will introduce practical radio attacks on the LoRaWAN protocol and its stack. To start the presentation, we will shortly be speaking about previous research and challenges to overcome some limitations encountered in the past when attacking these technologies. Then, we will introduce and demonstrate our tools to assess radio communications, but also to investigate further when looking for new vulnerabilities. In the end, we will conclude with the security measures we must take in place to protect from these attacks.

IoT has been adopted by many application areas including manufacturing, “smart” cities, tracking, and other use cases, and has been within attacker’s reach for some time. Chosen for their far-reaching, LPWAN technologies such as NB-IoT, Zigbee, Sigox, but also LoRa play a big role in connecting these IoT devices.

In this presentation, we will introduce practical radio attacks on the LoRaWAN protocol and its stack. To start the presentation, we will shortly be speaking about previous research and challenges to overcome some limitations encountered in the past when attacking these technologies. Then, we will introduce and demonstrate our tools to assess radio communications, but also to investigate further when looking for new vulnerabilities. In the end, we will conclude with the security measures we must take in place to protect from these attacks.

Become a partner.

Become part of The Things Conference and get in touch with tens of thousands of LoRaWAN professionals.

Reach out