Researchers Find Some LoRaWAN Networks Vulnerable to Cyber-Attacks (zdnet.com) 6
Slashdot reader JustAnotherOldGuy quotes ZDNet:
Security experts have published a report Tuesday warning that the new and fast-rising LoRaWAN technology is vulnerable to cyberattacks and misconfigurations, despite claims of improved security rooted in the protocol's use of two layers of encryption.
LoRaWAN stands for "Long Range Wide Area Network." It is a radio-based technology that works on top of the proprietary LoRa protocol. LoRaWAN takes the LoRa protocol and allows devices spread across a large geographical area to wirelessly connect to the internet via radio waves...
But broadcasting data from devices via radio waves is not a secure approach. However, the protocol's creators anticipated this issue. Since its first version, LoRaWAN has used two layers of 128-bit encryption to secure the data being broadcast from devices — with one encryption key being used to authenticate the device against the network server and the other against a company's backend application. In a 27-page report published Tuesday, security researchers from IOActive say the protocol is prone to misconfigurations and design choices that make it susceptible to hacking and cyber-attacks. The company lists several scenarios it found plausible during its analysis of this fast-rising protocol.
Some examples:
LoRaWAN stands for "Long Range Wide Area Network." It is a radio-based technology that works on top of the proprietary LoRa protocol. LoRaWAN takes the LoRa protocol and allows devices spread across a large geographical area to wirelessly connect to the internet via radio waves...
But broadcasting data from devices via radio waves is not a secure approach. However, the protocol's creators anticipated this issue. Since its first version, LoRaWAN has used two layers of 128-bit encryption to secure the data being broadcast from devices — with one encryption key being used to authenticate the device against the network server and the other against a company's backend application. In a 27-page report published Tuesday, security researchers from IOActive say the protocol is prone to misconfigurations and design choices that make it susceptible to hacking and cyber-attacks. The company lists several scenarios it found plausible during its analysis of this fast-rising protocol.
Some examples:
- "Encryption keys can be extracted from devices by reverse engineering the firmware of devices that ship with a LoRaWAN module."
- "Many devices come with a tag displaying a QR code and/or text with the device's identifier, security keys, or more."
Physical Access to Device (Score:1)
You should assume the network is vulnerable if there is physical access to the equipment!
Re: (Score:2)
Yeah, but putting a sticker on it with the embedded key is taking that a bit far. That sort of defeats any tamper-resistance built into the hardware.
Hardcoded keys (Score:2)
"Encryption keys can be extracted from devices by reverse engineering the firmware of devices
Why in 2020 there are still devices that ship with hard-coded keys?
endpoint encryption ? (Score:2)
I haven't figured out why they keep trying to put encryption in the hardware, where it's much more difficult to update, even with flash in the unit.
the encryption needs to be in software on the endpoints and just let the radio waves transmit pure data, agnostically.
Look at all the holes that were found in early Wifi versions of encryption. Is it even secure at this point in time ?
Is there some scenario where you _must_ have the encryption done in hardware ?
Even "weak" devices like tablets shouldn't have mu
Re:endpoint encryption ? (Score:5, Interesting)
RF networks (Score:1)