Experimental evaluation of jamming threat in LoRaWAN

Chin Ya Huang, Ching Wei Lin, Ray Guang Cheng, Shanchieh Jay Yang, Shiann Tsong Sheu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations

Abstract

LoRaWAN is a promising solution of Low-power wide area network (LPWAN) operating in unlicensed spectrum to support long range wireless services for Internet of Things (IoTs). However, with the growth of IoT devices deployed in a fixed geographic area, the immunity to interference on the communication increases significantly. Attackers may utilize such situation to jam packet transmission by emitting RF interference signal at the same time when a LoRa end node is sending data to the LoRa gateway. As a consequence, the transmission of the LoRa end node would fail due to collision which would in turn reduce the network performance. In this paper, we implement a LoRa jammer on commercial LoRa devices by modifying the open source and figure out the proper setting of the jammer through three scenarios aiming to evaluate the influence of LoRa transmission configuration on jamming performance. Specifically, the impact of non-orthogonality of LoRa transmission on jamming effect is investigated. Possible countermeasures for LoRaWAN are then presented to alleviate the jamming attacks.

Original languageEnglish
Title of host publication2019 IEEE 89th Vehicular Technology Conference, VTC Spring 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728112176
DOIs
StatePublished - Apr 2019
Event89th IEEE Vehicular Technology Conference, VTC Spring 2019 - Kuala Lumpur, Malaysia
Duration: 28 Apr 20191 May 2019

Publication series

NameIEEE Vehicular Technology Conference
Volume2019-April
ISSN (Print)1550-2252

Conference

Conference89th IEEE Vehicular Technology Conference, VTC Spring 2019
Country/TerritoryMalaysia
CityKuala Lumpur
Period28/04/191/05/19

Fingerprint

Dive into the research topics of 'Experimental evaluation of jamming threat in LoRaWAN'. Together they form a unique fingerprint.

Cite this