Olazabal, Alessandra Alvarez, Kaur, Jasmeet and Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2022) Deploying Man-In-the-Middle attack on IoT devices connected to Long Range Wide Area Networks (LoRaWAN). In: 2022 IEEE International Smart Cities Conference (ISC2), 26-29 Sep 2022, Pafos, Cyprus.
Preview |
PDF
Deploying Man-In-the-Middle Attack on IoT Devices Conneted to LoRaWAN - IEEE UWL Repo.pdf - Accepted Version Download (920kB) | Preview |
Abstract
Advancements in research and innovation on Smart IoT technology have provided quality of life to physical and visually impaired users. However, deploying Man-In-the-Middle (MITM) attacks on IoT devices that use Long Range Wide Area Networks (LoRaWAN) has increased exponentially due to the high user demand and increased access to the internet. As a result, there is a high probability of user data being exploited, especially on visually impaired user IoT devices, by penetrating the network devices leading to cyberattacks such as remote access, extortion, sabotage, and loss of internet access. This paper explores the methods used by threat actors to deploy MITM attacks on IoT devices that use LoRaWAN to detect vulnerabilities, understand attack patterns and assist in understanding human factors in cyber security. The contribution of this paper is threefold: First, we review the existing attacks on IoT devices and their impact on visually impaired users. Secondly, we implement a MITM attack using an open-source tool to exploit the LoRaWAN to determine the vulnerabilities. Finally, we recommend a control mechanism to improve security. The results show that the MITM attack can be replicated on devices, demonstrating the importance of creating more robust security to prevent information or identity theft without the user's permission.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISSN: | 2687-8860 |
ISBN: | 9781665485616 |
Identifier: | 10.1109/ISC255366.2022.9922377 |
Identifier: | 10.1109/ISC255366.2022.9922377 |
Additional Information: | © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Keywords: | Wide area networks, Technological innovation, Smart cities, Human factors, Internet of Things, Security, Object recognition |
Subjects: | Computing > Information security |
Related URLs: | |
Depositing User: | Dr Abel Yeboah-Ofori |
Date Deposited: | 21 Mar 2023 13:40 |
Last Modified: | 25 Nov 2024 16:15 |
URI: | https://repository.uwl.ac.uk/id/eprint/9871 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |