LoRaWAN에서 재전송 및 Bit-Flipping 공격의 보안 위협 분석을 통한 대응 기법

  • Published : 2017.01.31

Abstract

Keywords

References

  1. Kim S.Y., Park S.K., Choi H.D., "Wide Range loT Technology and Standardization based on LPWA", Electronics and Telecommunications Trends, Vol. 31, No. 2, pp. 95-106, Apr, 2016
  2. P. Syverson, "A taxonomy of replay attacks [cryptographic protocols]," in Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE, 1994, pp.187-191.
  3. T. Kwon and J. Song, "Clarifying straight replays and forced delays," ACM SIGOPS Operating Systems Review, vol. 33, no. 1, pp. 47-52, 1999. https://doi.org/10.1145/309829.309842
  4. H. Lipmaa, P. Rogaway, and D. Wagner, "Ctr-mode encryption," in First NIST Workshop on Modes of Operation, 2000.
  5. R. Miller, "Lora security building a secure lora solution," [Online]. Available: http://www.lovdata.no/cgiwift/ldles?doc=/sf/sf/sf-20100326-0489.htm
  6. K. G. Paterson and A. K. Yau, "Cryptography in theory and practice: The case of encryption in ipsec," in Annual International Conference on the Theory and Applications
  7. O'Flynn, Colin P. "Message denial and alteration on IEEE 802.15. 4 low-power radio networks." New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on. IEEE, 2011.
  8. Sung-Hyung Lee, Jae-Hyun Kim. "Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism." The Institute of Electronics Engineers of Korea - Telecommunications, 47.4 (2010.4): 63-72.
  9. Zulian, Simone. "Security threat analysis and countermeasures for LoRaWAN join procedure." (2016).
  10. Mitchell, Changhua He John C. "Security Analysis and Improvements for IEEE 802.11 i." The 12th Annual Network and Distributed System Security Symposium (NDSS'05) Stanford University, Stanford. 2005.
  11. S. Ansari, S. Rajeev, and H. Chandrashekar, "Packet sniffing: a brief introduction," IEEE potentials, vol. 21, no. 5, pp. 17-19, 2002. https://doi.org/10.1109/MP.2002.1166620
  12. P. Asrodia and H. Patel, "Analysis of various packet sniffing tools for network monitoring and analysis," International Journal of Electrical, Electronics and Computer Engineering, vol. 1, no. 1, pp. 55-58, 2012.
  13. N. Sornin, M. Luis, T. Eirich, T. Kramp, and O. Hersent, "Lorawan specifications", LoRa Alliance, 2015.
  14. W. Diffie and M. E. Hellman, "Privacy and authentication: An introduction to cryptography," Proceedings of the IEEE, vol. 67, no. 3, pp. 397-427, 1979. https://doi.org/10.1109/PROC.1979.11256
  15. N. F. Pub, "197: Advanced encryption standard (aes)," Federal Information Processing Standards Publication, vol. 197, pp. 441-0311, 2001.
  16. A. H. Lashkari, M. M. S. Danesh, and B. Samadi, "A survey on wireless security protocols (wep, wpa and wpa2/802.11 i)," in Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on. IEEE, 2009, pp. 48-52.
  17. H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: a review," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3. IEEE, 2012, pp. 648-651.
  18. J. Song, R. Poovendran, J. Lee, and T. Iwata, "The aes-cmac algorithm," Tech. Rep., 2006.
  19. S. Zulian, "Security threat analysis and countermeasures for lorawanjoin procedure," 2016.
  20. Na S.J, Hwang D.Y., Shin W.S, Kim K.H, "Scenario and Countermeasure for Replay Attack Using Join Request Messages in LoRaWAN", ICOlN 2017 (31st International Conference on Information Networking), pp. 718-720, 2017
  21. Lee J. W, Hwang D. Y, Park J.H, Kim K.H, "Risk Analysis and Countermeasure for Bit-Flipping Attack in LoRa WAN", ICOlN 2017 (31 st International Conference on Information Networking), pp549-551, 2017