SlideShare a Scribd company logo
1 of 29
IoT LPWAN security
Sigfox & LoRaWAN
Mikael Falkvidd
KnowIT Secure Insight 2018-05-08
About Mikael Falkvidd
80+ published articles inChapter leader Core team member
Independent consultant,
Falkvidd Holding AB
Past positions:
Development Team Lead, OP5
IT Consultant, Accenture
Product Owner, Ericsson
Solution Architect, Ericsson
Key takeaways
● An overview of what LPWAN, Sigfox and LoRaWAN is and why they are
important
● What security mechanisms do they provide?
● Raise curiosity: How do I attack/inspect LPWAN traffic?
What is LPWAN? (1)
Low Power
● 25mW/14dBm RF output (wifi is 100mW/20 dBm, 3G is 2000mW/33 dBm )
● 2+ years on single lithium cell
● 10+ years on 2xAA
Wide Area
● 15-40 km radius per base station / gateway
● Sub-GHz ISM band (868/902/915 MHz depending on region)
Network
● This is where it get interesting from a security standpoint :-)
What is LPWAN? (2)
Message-oriented
● 1 uplink message every 10 minutes max*
● Message size max 12 bytes (Sigfox) or 51–255 bytes (LoRaWAN)**
Limited downlink
● No confirmation
● Downlink always initiated by uplink - no unsolicited traffic
● Sigfox: max 4 messages per 24h, max 8 bytes each
● LoRaWAN: 10 messages per 24h, max 51–255 bytes each
Low-cost: Sigfox connectivity costs 15 EUR per year and device for 1 device.
~1EUR per year and device for 50,000 devices (10%-1% of cost with Telia IoT)
Sigfox and LoRaWAN main
differences Sigfox LoRaWAN
Coverage - global 45 countries, 803M people 90+ countries
Coverage - Sweden 60% of population
Local (city-wide) networks
exist
Base stations / gateways Always owned by operator
Anyone can put up a
gateway, hardware cost from
~200EUR
Backend Owned by Sigfox
Local providers, TTN (partly
open source), open source,
DIY
Security areas
● Physical device
● Radio communication
● Base stations / gateways
● Gateway to backend system
● Backend system
● Backend to application
communication
● Application
Physical device attacks
● Destroy it
● Extract keys
● Modify firmware
LoRaWAN and Sigfox use per device keys, so compromisation of one device
impacts only that device and its data. The rest is your responsibility:
● Physical protection
● Use secure elements to protect keys
● Signed firmware updates* / verify firmware integrity
Radio communication - Sigfox
● Each Sigfox device is provisioned with a unique symmetrical authentication
key
● All messages to from the device are protected by a MAC using a key
derived from the symmetrical key, providing authenticity and integrity.
● All messages include a sequence counter, to prevent replay attacks
● Sigfox can provide confidentiality but does not require encryption. Device
makers can add Sigfox-provided encryption as part of certification, or add
their own flavor.
● Sigfox’s goal is to have each location covered by at least 3 base stations, to
increase availability / be more jamming-resistant.
Radio packet format - Sigfox
+--------+--------+--------+------------------+-------------+-----+
|Preamble| Frame | Dev ID | Payload |Msg Auth Code| FCS |
| | Sync | | | | |
+--------+--------+--------+------------------+-------------+-----+
● Preamble: 19 bits
● Frame sync and header: 29 bits
● Device ID: 32 bits
● Payload: 0-96 bits
● Authentication: 16-40 bits
● Frame check sequence: 16 bits (CRC)
Base stations - Sigfox
● All Sigfox base stations have a Trusted
Platform Module (TPM), which manages
encryption keys and verifies the base
station’s integrity.
● The operating system uses Secure Boot
● Communication with the backend
system is done through VPN. The VPN
key is stored in the TPM.
Sigfox backend and your application
● Sigfox data centers adhere to SSAE16/ISAE3402 SOC-1 Type II - ISO
27001 - PCI-DSS - FACT - ISO 9001-2008 - ISO 50001
● “State-of-the-art solutions have been deployed to ensure the integrity,
availability and confidentiality of [devices’ authentication keys as well as
traffic metadata.].” *
● Communication between the Sigfox backend and your application uses
HTTPS.
● Your application is (of course) your responsibility
Radio packet format - LoRaWAN
LoRaWAN keys in TTN
Network session key (NwkSKey)
● used for interaction between the Node and the Network and routing
● check the validity of messages
Application session key (AppSKey)
● encryption and decryption of the payload
● payload is encrypted between the device and the Handler component of TTN, which
you will be able to run on your own server (LoRaWAN 1.1).
When dynamically activating a LoRaWAN device (OTAA), these keys are re-generated on
every activation. If you statically activate your device (ABP), these keys stay the same
until you change them.
Real-world examples
Securitas Direct uses a Sigfox device to report GSM jamming attacks. They have
deployed more than 1.6M units.
Real-world examples
The city of Gothenburg received a 2.19 MSEK grant from Vinnova to use
LoRaWAN-based sensors for measuring air and water quality.
Getting your hands dirty
Wireshark
● Sigfox dissector for Wireshark (WIP)
● LoRaWAN dissector for Wireshark (Orange, docs
in French)
GNU radio
● GNU Radio scrapy for Sigfox
● Gr-lora for LoRa (LoRaWAN not yet supported)
Get your own radio module / device
Build/buy your own gateway (LoRaWAN)
Learn more
https://yadom.eu/reseaux-iot/sigfox/carte-breakout-sfm10r1.html Sigfox radio module, controlled by AT
commands on 9600bps serial 24 EUR
https://www.m.nu/pycom/lopy-with-headers Microcontroller that runs python with LoRa radio module 379kr
https://github.com/int0x191f2/wireshark-sigfox
https://github.com/ltn22/LoRaWAN-Wireshark-Dissector
https://bitbucket.org/cybertools/scapy-radio/overview Sigfox Gnu Radio Companion
https://github.com/BastilleResearch/gr-lora LoRa Gnu Radio Companion
https://github.com/matthijskooijman/arduino-lmic Arduino LoRaWAN library for devices
https://www.youtube.com/watch?v=-YNMRZC6v1s Matt Knight at GRCon16
https://www.youtube.com/watch?v=NoquBA7IMNc Matt Knight at CCC
https://github.com/rpp0/gr-lora another LoRa Gnu Radio Companion, not the same as the one by Bastille
Backup slides
Choose the right security level for
your application
● Example: Outdoor environmental data probably doesn’t need to be kept
confidential (temperature, rainfall, air humidity, barometric pressure, etc)
● In other cases, the fact that the device is communicating at all might reveal
sensitive information
● Know what the network provides for you, and what you need to take
responsibility for
Software defined radio - Sigfox
Software defined radio - LoRa (1)
Software defined radio
- LoRa (2)
● https://revspace.nl/DecodingLora
● Matt Knight - Reversing LoRa and his
presentation at the RSA conference
this year
Cisco industrial LoRaWAN router
TTN kickstarter gateway
Sigfox Sweden
coverage
TTN Europe gateway locations
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secure insight 2018-05-08)
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secure insight 2018-05-08)

More Related Content

What's hot

IRJET- Design of Steering System for All Terrain Vehicle
IRJET- Design of Steering System for All Terrain VehicleIRJET- Design of Steering System for All Terrain Vehicle
IRJET- Design of Steering System for All Terrain VehicleIRJET Journal
 
CNC Plotter Using Spare Parts
CNC Plotter Using Spare PartsCNC Plotter Using Spare Parts
CNC Plotter Using Spare PartsSasukeo1
 
Antenna Azimuth Position Control System using PIDController & State-Feedback ...
Antenna Azimuth Position Control System using PIDController & State-Feedback ...Antenna Azimuth Position Control System using PIDController & State-Feedback ...
Antenna Azimuth Position Control System using PIDController & State-Feedback ...IJECEIAES
 
a vocational training report at Mega (CHEVROLET) Auto workshop, Lucknow
a vocational training report at Mega (CHEVROLET) Auto workshop, Lucknowa vocational training report at Mega (CHEVROLET) Auto workshop, Lucknow
a vocational training report at Mega (CHEVROLET) Auto workshop, LucknowPraveen Kumar Kushwaha
 
Doha Metro Track
Doha Metro TrackDoha Metro Track
Doha Metro TrackKumar M.
 
Pantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction ControlPantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction ControlKelvin Lam
 
Modeling & Simulation of Shock-Absorber Test Rig
Modeling & Simulation of Shock-Absorber Test RigModeling & Simulation of Shock-Absorber Test Rig
Modeling & Simulation of Shock-Absorber Test RigAnkit Kumar Dixit
 
Lockheed U-2 - O SOBREVIVENTE
Lockheed U-2 - O SOBREVIVENTELockheed U-2 - O SOBREVIVENTE
Lockheed U-2 - O SOBREVIVENTERicardo Montedo
 
Some thing about piston design using ansys
Some thing about piston design using ansysSome thing about piston design using ansys
Some thing about piston design using ansysSattar200
 
ブランド・アイデンティティ(アーカーモデル)についてのメモ
ブランド・アイデンティティ(アーカーモデル)についてのメモブランド・アイデンティティ(アーカーモデル)についてのメモ
ブランド・アイデンティティ(アーカーモデル)についてのメモyasusasaki
 
TRAIN WHEEL ASSEMBLY
TRAIN WHEEL ASSEMBLYTRAIN WHEEL ASSEMBLY
TRAIN WHEEL ASSEMBLYNikhil Kakkar
 
AUTOMATED STAIR CLIMBING WHEELCHAIR
AUTOMATED STAIR CLIMBING WHEELCHAIRAUTOMATED STAIR CLIMBING WHEELCHAIR
AUTOMATED STAIR CLIMBING WHEELCHAIRShubham Rai
 

What's hot (15)

Autocad
AutocadAutocad
Autocad
 
IRJET- Design of Steering System for All Terrain Vehicle
IRJET- Design of Steering System for All Terrain VehicleIRJET- Design of Steering System for All Terrain Vehicle
IRJET- Design of Steering System for All Terrain Vehicle
 
CNC Plotter Using Spare Parts
CNC Plotter Using Spare PartsCNC Plotter Using Spare Parts
CNC Plotter Using Spare Parts
 
Antenna Azimuth Position Control System using PIDController & State-Feedback ...
Antenna Azimuth Position Control System using PIDController & State-Feedback ...Antenna Azimuth Position Control System using PIDController & State-Feedback ...
Antenna Azimuth Position Control System using PIDController & State-Feedback ...
 
a vocational training report at Mega (CHEVROLET) Auto workshop, Lucknow
a vocational training report at Mega (CHEVROLET) Auto workshop, Lucknowa vocational training report at Mega (CHEVROLET) Auto workshop, Lucknow
a vocational training report at Mega (CHEVROLET) Auto workshop, Lucknow
 
Doha Metro Track
Doha Metro TrackDoha Metro Track
Doha Metro Track
 
Pantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction ControlPantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction Control
 
BAJA SAE INDIA 2015
BAJA SAE INDIA 2015BAJA SAE INDIA 2015
BAJA SAE INDIA 2015
 
Modeling & Simulation of Shock-Absorber Test Rig
Modeling & Simulation of Shock-Absorber Test RigModeling & Simulation of Shock-Absorber Test Rig
Modeling & Simulation of Shock-Absorber Test Rig
 
Lockheed U-2 - O SOBREVIVENTE
Lockheed U-2 - O SOBREVIVENTELockheed U-2 - O SOBREVIVENTE
Lockheed U-2 - O SOBREVIVENTE
 
Some thing about piston design using ansys
Some thing about piston design using ansysSome thing about piston design using ansys
Some thing about piston design using ansys
 
ブランド・アイデンティティ(アーカーモデル)についてのメモ
ブランド・アイデンティティ(アーカーモデル)についてのメモブランド・アイデンティティ(アーカーモデル)についてのメモ
ブランド・アイデンティティ(アーカーモデル)についてのメモ
 
TRAIN WHEEL ASSEMBLY
TRAIN WHEEL ASSEMBLYTRAIN WHEEL ASSEMBLY
TRAIN WHEEL ASSEMBLY
 
AUTOMATED STAIR CLIMBING WHEELCHAIR
AUTOMATED STAIR CLIMBING WHEELCHAIRAUTOMATED STAIR CLIMBING WHEELCHAIR
AUTOMATED STAIR CLIMBING WHEELCHAIR
 
L.H.B. Coaches
L.H.B. CoachesL.H.B. Coaches
L.H.B. Coaches
 

Similar to IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secure insight 2018-05-08)

Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015CODE BLUE
 
Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CityNicolas Lesconnec
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisAurelien Lequertier
 
ST tech tour - sigfox presentation & hands-on demp
ST tech tour - sigfox presentation & hands-on dempST tech tour - sigfox presentation & hands-on demp
ST tech tour - sigfox presentation & hands-on dempFrançois Oudot
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Robert Vivanco Salcedo
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraEmbarcados
 
A Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G RouterA Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G RouterE-Lins Technology Co. Ltd.
 
SigfoxGettingStarted October2018
SigfoxGettingStarted October2018SigfoxGettingStarted October2018
SigfoxGettingStarted October2018Aurelien Lequertier
 
[May 2018] Sigfox Technology Overview
[May 2018] Sigfox Technology Overview[May 2018] Sigfox Technology Overview
[May 2018] Sigfox Technology OverviewNicolas Lesconnec
 
Webinar: Desenvolvimento NB-IoT de baixíssimo consumo
Webinar: Desenvolvimento NB-IoT de baixíssimo consumoWebinar: Desenvolvimento NB-IoT de baixíssimo consumo
Webinar: Desenvolvimento NB-IoT de baixíssimo consumoEmbarcados
 

Similar to IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secure insight 2018-05-08) (20)

20171106 - Workshop lille
20171106 -  Workshop lille20171106 -  Workshop lille
20171106 - Workshop lille
 
SigfoxMakersDay Total
SigfoxMakersDay TotalSigfoxMakersDay Total
SigfoxMakersDay Total
 
IoT_standards
IoT_standardsIoT_standards
IoT_standards
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
 
Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
 
SigfoxGettingStarted
SigfoxGettingStartedSigfoxGettingStarted
SigfoxGettingStarted
 
LoRaWAN Overview for Retail
LoRaWAN Overview for RetailLoRaWAN Overview for Retail
LoRaWAN Overview for Retail
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParis
 
ST tech tour - sigfox presentation & hands-on demp
ST tech tour - sigfox presentation & hands-on dempST tech tour - sigfox presentation & hands-on demp
ST tech tour - sigfox presentation & hands-on demp
 
Sigfox Euratech Workshop
Sigfox Euratech WorkshopSigfox Euratech Workshop
Sigfox Euratech Workshop
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)
 
Unizen LORA Flyer
Unizen LORA FlyerUnizen LORA Flyer
Unizen LORA Flyer
 
Xr450
Xr450Xr450
Xr450
 
LCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN GatewayLCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN Gateway
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
Workshop Taiwan
Workshop TaiwanWorkshop Taiwan
Workshop Taiwan
 
A Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G RouterA Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G Router
 
SigfoxGettingStarted October2018
SigfoxGettingStarted October2018SigfoxGettingStarted October2018
SigfoxGettingStarted October2018
 
[May 2018] Sigfox Technology Overview
[May 2018] Sigfox Technology Overview[May 2018] Sigfox Technology Overview
[May 2018] Sigfox Technology Overview
 
Webinar: Desenvolvimento NB-IoT de baixíssimo consumo
Webinar: Desenvolvimento NB-IoT de baixíssimo consumoWebinar: Desenvolvimento NB-IoT de baixíssimo consumo
Webinar: Desenvolvimento NB-IoT de baixíssimo consumo
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secure insight 2018-05-08)

  • 1. IoT LPWAN security Sigfox & LoRaWAN Mikael Falkvidd KnowIT Secure Insight 2018-05-08
  • 2. About Mikael Falkvidd 80+ published articles inChapter leader Core team member Independent consultant, Falkvidd Holding AB Past positions: Development Team Lead, OP5 IT Consultant, Accenture Product Owner, Ericsson Solution Architect, Ericsson
  • 3. Key takeaways ● An overview of what LPWAN, Sigfox and LoRaWAN is and why they are important ● What security mechanisms do they provide? ● Raise curiosity: How do I attack/inspect LPWAN traffic?
  • 4. What is LPWAN? (1) Low Power ● 25mW/14dBm RF output (wifi is 100mW/20 dBm, 3G is 2000mW/33 dBm ) ● 2+ years on single lithium cell ● 10+ years on 2xAA Wide Area ● 15-40 km radius per base station / gateway ● Sub-GHz ISM band (868/902/915 MHz depending on region) Network ● This is where it get interesting from a security standpoint :-)
  • 5. What is LPWAN? (2) Message-oriented ● 1 uplink message every 10 minutes max* ● Message size max 12 bytes (Sigfox) or 51–255 bytes (LoRaWAN)** Limited downlink ● No confirmation ● Downlink always initiated by uplink - no unsolicited traffic ● Sigfox: max 4 messages per 24h, max 8 bytes each ● LoRaWAN: 10 messages per 24h, max 51–255 bytes each Low-cost: Sigfox connectivity costs 15 EUR per year and device for 1 device. ~1EUR per year and device for 50,000 devices (10%-1% of cost with Telia IoT)
  • 6. Sigfox and LoRaWAN main differences Sigfox LoRaWAN Coverage - global 45 countries, 803M people 90+ countries Coverage - Sweden 60% of population Local (city-wide) networks exist Base stations / gateways Always owned by operator Anyone can put up a gateway, hardware cost from ~200EUR Backend Owned by Sigfox Local providers, TTN (partly open source), open source, DIY
  • 7. Security areas ● Physical device ● Radio communication ● Base stations / gateways ● Gateway to backend system ● Backend system ● Backend to application communication ● Application
  • 8. Physical device attacks ● Destroy it ● Extract keys ● Modify firmware LoRaWAN and Sigfox use per device keys, so compromisation of one device impacts only that device and its data. The rest is your responsibility: ● Physical protection ● Use secure elements to protect keys ● Signed firmware updates* / verify firmware integrity
  • 9. Radio communication - Sigfox ● Each Sigfox device is provisioned with a unique symmetrical authentication key ● All messages to from the device are protected by a MAC using a key derived from the symmetrical key, providing authenticity and integrity. ● All messages include a sequence counter, to prevent replay attacks ● Sigfox can provide confidentiality but does not require encryption. Device makers can add Sigfox-provided encryption as part of certification, or add their own flavor. ● Sigfox’s goal is to have each location covered by at least 3 base stations, to increase availability / be more jamming-resistant.
  • 10. Radio packet format - Sigfox +--------+--------+--------+------------------+-------------+-----+ |Preamble| Frame | Dev ID | Payload |Msg Auth Code| FCS | | | Sync | | | | | +--------+--------+--------+------------------+-------------+-----+ ● Preamble: 19 bits ● Frame sync and header: 29 bits ● Device ID: 32 bits ● Payload: 0-96 bits ● Authentication: 16-40 bits ● Frame check sequence: 16 bits (CRC)
  • 11. Base stations - Sigfox ● All Sigfox base stations have a Trusted Platform Module (TPM), which manages encryption keys and verifies the base station’s integrity. ● The operating system uses Secure Boot ● Communication with the backend system is done through VPN. The VPN key is stored in the TPM.
  • 12. Sigfox backend and your application ● Sigfox data centers adhere to SSAE16/ISAE3402 SOC-1 Type II - ISO 27001 - PCI-DSS - FACT - ISO 9001-2008 - ISO 50001 ● “State-of-the-art solutions have been deployed to ensure the integrity, availability and confidentiality of [devices’ authentication keys as well as traffic metadata.].” * ● Communication between the Sigfox backend and your application uses HTTPS. ● Your application is (of course) your responsibility
  • 13. Radio packet format - LoRaWAN
  • 14. LoRaWAN keys in TTN Network session key (NwkSKey) ● used for interaction between the Node and the Network and routing ● check the validity of messages Application session key (AppSKey) ● encryption and decryption of the payload ● payload is encrypted between the device and the Handler component of TTN, which you will be able to run on your own server (LoRaWAN 1.1). When dynamically activating a LoRaWAN device (OTAA), these keys are re-generated on every activation. If you statically activate your device (ABP), these keys stay the same until you change them.
  • 15. Real-world examples Securitas Direct uses a Sigfox device to report GSM jamming attacks. They have deployed more than 1.6M units.
  • 16. Real-world examples The city of Gothenburg received a 2.19 MSEK grant from Vinnova to use LoRaWAN-based sensors for measuring air and water quality.
  • 17. Getting your hands dirty Wireshark ● Sigfox dissector for Wireshark (WIP) ● LoRaWAN dissector for Wireshark (Orange, docs in French) GNU radio ● GNU Radio scrapy for Sigfox ● Gr-lora for LoRa (LoRaWAN not yet supported) Get your own radio module / device Build/buy your own gateway (LoRaWAN)
  • 18. Learn more https://yadom.eu/reseaux-iot/sigfox/carte-breakout-sfm10r1.html Sigfox radio module, controlled by AT commands on 9600bps serial 24 EUR https://www.m.nu/pycom/lopy-with-headers Microcontroller that runs python with LoRa radio module 379kr https://github.com/int0x191f2/wireshark-sigfox https://github.com/ltn22/LoRaWAN-Wireshark-Dissector https://bitbucket.org/cybertools/scapy-radio/overview Sigfox Gnu Radio Companion https://github.com/BastilleResearch/gr-lora LoRa Gnu Radio Companion https://github.com/matthijskooijman/arduino-lmic Arduino LoRaWAN library for devices https://www.youtube.com/watch?v=-YNMRZC6v1s Matt Knight at GRCon16 https://www.youtube.com/watch?v=NoquBA7IMNc Matt Knight at CCC https://github.com/rpp0/gr-lora another LoRa Gnu Radio Companion, not the same as the one by Bastille
  • 20. Choose the right security level for your application ● Example: Outdoor environmental data probably doesn’t need to be kept confidential (temperature, rainfall, air humidity, barometric pressure, etc) ● In other cases, the fact that the device is communicating at all might reveal sensitive information ● Know what the network provides for you, and what you need to take responsibility for
  • 23. Software defined radio - LoRa (2) ● https://revspace.nl/DecodingLora ● Matt Knight - Reversing LoRa and his presentation at the RSA conference this year
  • 27. TTN Europe gateway locations

Editor's Notes

  1. How many know what LPWAN is? Sigfox? LoRaWAN?
  2. Jag jobbar som IoT-konsult här i Göteborg Tidigare varit på OP5, som gör en mjukvara för att övervaka servrar och nätverksprylar Sitter i styrelsen för OWASP Göteborg. Ideell organisation med rötterna i USA som jobbar för att göra säkerhetsfrågor och -verktyg mer synliga. Medlem i MySensors core-team. MySensors är ett projekt med öppen mjukvara och hårdvara för att göra egna Arduinobaserade IoT-enheter. Skrivit över 80 artiklar i svenska tidningen Datormagazin, nu senast reportage från IoT-konferenser och hur du kan bygga egna IoT-enheter.
  3. Vad är LPWAN, Sigfox och LoRaWAN och varför är de viktiga? Vilka säkerhetsfunktioner finns? Hur kan du få praktisk erfarenhet av LPWAN?
  4. Låg strömförbrukning: 25% av wifi och 1,25% av 3G Lång räckvidd: Engelska kanalen 250km. TTN LoRaWAN record: 702km väderballong. 0.1-10% duty cycle
  5. * Sigfox: Depends on class, can be lower ** Depends on data rate / spreading factor. Will affect the number of messages allowed. Airtime calculator: https://docs.google.com/spreadsheets/d/1QvcKsGeTTPpr9icj4XkKXq4r2zTc2j0gsHLrnplzM3I/edit#gid=0 Telia’s starter package “IoT connect” is 99EUR per month for 10 devices. LoRaWAN har en annan prismodell men brukar hamna på ungefär samma kostnad
  6. Sigfox har nästan dubblat täckningen varje år. LoRaWAN: TTN 3 700 gateways Comcast (US), KPN (NL), Proximus (BE), Orange (FR), SK telecom (SK), Tata Communications (IN) and more Gothenburg: Sigfox har bra utomhustäckning och ok inomhustäckning Tele2 LoRaWAN testnätverka ungefär samma täckning som Sigfox men inte lätt att få tillgång till. ~5 TTN gateways i Göteborg. Kort räckvidd. https://github.com/Lora-net open source code for node, gateway and packet forwarder
  7. Jag visar var nätverket tar ansvar och var du måste ta ansvar
  8. Sigfox does not provide a way to update firmware over the air, but radio modules with LTE-M or similar solutions can be used. LoRaWAN: TTN has a working PoC together with ARM, plan is to get it into the LoRaWAN standard.
  9. AES CTR mode Hiding the fact that the device is communicating is tricky, especially with the low message rate allowed.
  10. * This is unfortunately the way Sigfox presents its security. We all know this is marketing speech and usually means nothing. At least they didn’t put “military-grade” in there. To get more information you’ll need to sign a NDA, which usually is a bad sign. You’ll need to decide if you trust Sigfox or not. If you don’t, add additional protection or use an alternative where you take end-to-end responsibility. “Sigfox is continuously investing in security and partnering with research institutes and domain experts, working on advanced research topics such as machine learning, anomaly detection, and advanced cryptographic algorithms.”
  11. Sizes are in bits Source: Augustin, Aloÿs & Yi, Jiazi & Clausen, Thomas Heide & Mark Townsley, William. (2016). A Study of LoRa: Long Range & Low Power Networks for the Internet of Things. Sensors. 16. 1466. 10.3390/s16091466.
  12. Different LoRaWAN implementations can use slight variations of this More details: https://www.thethingsnetwork.org/wiki/Backend/Home and https://www.thethingsnetwork.org/wiki/LoRaWAN/Security In the current implementation, TTN decrypts payload for you (just like Sigfox).
  13. These devices and networks are already out there.
  14. https://yadom.eu/reseaux-iot/sigfox/carte-breakout-sfm10r1.html 24 EUR https://www.m.nu/pycom/lopy-with-headers 379kr https://github.com/int0x191f2/wireshark-sigfox https://github.com/ltn22/LoRaWAN-Wireshark-Dissector https://bitbucket.org/cybertools/scapy-radio/overview https://github.com/BastilleResearch/gr-lora https://github.com/matthijskooijman/arduino-lmic Arduino LoRaWAN library for devices https://www.youtube.com/watch?v=-YNMRZC6v1s Matt Knight at GRCon16 https://github.com/rpp0/gr-lora https://www.youtube.com/watch?v=NoquBA7IMNc Matt Knight at CCC
  15. Yes, LoRa can use 433MHz as well, but no LoRaWAN networks are using it (yet?)
  16. https://revspace.nl/DecodingLora Matt Knight - Reversing LoRa and his presentation at the RSA conference this year