Skip to content

Latest commit

 

History

History
13 lines (8 loc) · 947 Bytes

README.md

File metadata and controls

13 lines (8 loc) · 947 Bytes

Hijacking Downlink Path Selection in LoRaWAN

Code repository with PoC of the attack for the paper "Hijacking downlink communication in a LoRaWAN Network" presented at Globecom 2021.


The attack blocks end-devices from receiving any downlink. It exploits the packet de-duplication and gateway selection inside the Network Server.

This attack has been proven to work against LoRaWAN 1.1 and 1.0x Network Servers.

Attack scheme

Consider a victim device we want to target. Consider two legitimate LoRaWAN gateways Gw1 and Gw2. Let the target device be in the range of only Gw1 and not Gw2. We deploy two malicious LoRaWAN devices, a sniffer and a replayer. We place the sniffer close to target and the replayer very close to Gw2, in such a way to have an excellent link quality to Gw2 (in terms of RSSI, SNR or whatever).

qwerty