Deploying Man-In-the-Middle attack on IoT devices connected to Long Range Wide Area Networks (LoRaWAN)

Olazabal, Alessandra Alvarez, Kaur, Jasmeet and Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2022) Deploying Man-In-the-Middle attack on IoT devices connected to Long Range Wide Area Networks (LoRaWAN). In: 2022 IEEE International Smart Cities Conference (ISC2), 26-29 Sep 2022, Pafos, Cyprus.

[thumbnail of Deploying Man-In-the-Middle Attack on IoT Devices Conneted to LoRaWAN - IEEE UWL Repo.pdf]
Preview
PDF
Deploying Man-In-the-Middle Attack on IoT Devices Conneted to LoRaWAN - IEEE UWL Repo.pdf - Accepted Version

Download (920kB) | Preview

Abstract

Advancements in research and innovation on Smart IoT technology have provided quality of life to physical and visually impaired users. However, deploying Man-In-the-Middle (MITM) attacks on IoT devices that use Long Range Wide Area Networks (LoRaWAN) has increased exponentially due to the high user demand and increased access to the internet. As a result, there is a high probability of user data being exploited, especially on visually impaired user IoT devices, by penetrating the network devices leading to cyberattacks such as remote access, extortion, sabotage, and loss of internet access. This paper explores the methods used by threat actors to deploy MITM attacks on IoT devices that use LoRaWAN to detect vulnerabilities, understand attack patterns and assist in understanding human factors in cyber security. The contribution of this paper is threefold: First, we review the existing attacks on IoT devices and their impact on visually impaired users. Secondly, we implement a MITM attack using an open-source tool to exploit the LoRaWAN to determine the vulnerabilities. Finally, we recommend a control mechanism to improve security. The results show that the MITM attack can be replicated on devices, demonstrating the importance of creating more robust security to prevent information or identity theft without the user's permission.

Item Type: Conference or Workshop Item (Paper)
ISSN: 2687-8860
ISBN: 9781665485616
Identifier: 10.1109/ISC255366.2022.9922377
Identifier: 10.1109/ISC255366.2022.9922377
Additional Information: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Keywords: Wide area networks, Technological innovation, Smart cities, Human factors, Internet of Things, Security, Object recognition
Subjects: Computing > Information security
Related URLs:
Depositing User: Dr Abel Yeboah-Ofori
Date Deposited: 21 Mar 2023 13:40
Last Modified: 25 Nov 2024 16:15
URI: https://repository.uwl.ac.uk/id/eprint/9871

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu