Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2023

13-06-2023

Bit flipping attack detection in low power wide area networks using a deep learning approach

Authors: Faezeh Alizadeh, Amir Jalaly Bidgoly

Published in: Peer-to-Peer Networking and Applications | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Low Power Wide Area Networks (LPWANs) are a class of wireless technologies with characteristics such as large coverage areas, low bandwidth, very small payload size, and long battery life operation. LPWANs applications are growing rapidly in the industry, although their restricted resources have created some vulnerabilities and attacks. Bit flipping attack is such a potential attack in encrypted LPWANs data in which an attacker, with the knowledge of the bit location of each data field, can alter data without needing decryption of the message. Current methods of bit flip detection are based on the use of traditional integrity checking methods such as digital signature, message integrity code, or some sender-side methods that either increase the sender’s power consumption or the size of the message payload, hence are not practical in LPWANs. This paper proposed a novel bit flipping detection method through machine learning which eliminates the need to increase neither the payload size nor the sender’s power consumption. The proposed method is based on pattern recognition of true messages sequence using a deep neural network which is then capable to detect tampered messages accordingly. The performance of the method has been evaluated in some case studies and experiments including different modes of attacks, applications, and environment and the results show up to 99.84% accuracy in bit flipping attack detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Raza U, Kulkarni P, Sooriyabandara M (2017) Low power wide area networks: An overview. IEEE Commun Surv Tutorials 19(2):855–873CrossRef Raza U, Kulkarni P, Sooriyabandara M (2017) Low power wide area networks: An overview. IEEE Commun Surv Tutorials 19(2):855–873CrossRef
3.
go back to reference Mekki K, Bajic E, Chaxel F, Meyer F. Overview of cellular LPWAN technologies for IoT deployment: Sigfox, LoRaWAN, and NB-IoT. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp 197–202 Mekki K, Bajic E, Chaxel F, Meyer F. Overview of cellular LPWAN technologies for IoT deployment: Sigfox, LoRaWAN, and NB-IoT. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp 197–202
4.
go back to reference Anani W, Ouda A, Hamou A. A Survey Of Wireless Communications for IoT Echo-Systems. In 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), pp 1–6 Anani W, Ouda A, Hamou A. A Survey Of Wireless Communications for IoT Echo-Systems. In 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), pp 1–6
5.
go back to reference Tugnait JK (2016) Detection of active eavesdropping attack by spoofing relay in multiple antenna systems. IEEE Wirel Commun Lett 5(5):460–463CrossRef Tugnait JK (2016) Detection of active eavesdropping attack by spoofing relay in multiple antenna systems. IEEE Wirel Commun Lett 5(5):460–463CrossRef
6.
go back to reference Aras E, Small N, Ramachandran GS, Delbruel S, Joosen W, Hughes D (2017) Selective jamming of LoRaWAN using commodity hardware, Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp 363–372 Aras E, Small N, Ramachandran GS, Delbruel S, Joosen W, Hughes D (2017) Selective jamming of LoRaWAN using commodity hardware, Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp 363–372
7.
go back to reference Danish SM, Qureshi HK, Jangsher S (2020) Jamming attack analysis of wireless power transfer on LoRaWAN join procedure. In 2018 IEEE Globecom Workshops (GC Wkshps), pp 1–6 Danish SM, Qureshi HK, Jangsher S (2020) Jamming attack analysis of wireless power transfer on LoRaWAN join procedure. In 2018 IEEE Globecom Workshops (GC Wkshps), pp 1–6
8.
go back to reference Sung W-J, Ahn H-G, Kim J-B, Choi S-G (2018) Protecting end-device from replay attack on LoRaWAN, in 2018 20th International Conference on Advanced Communication Technology (ICACT), pp 167–171 Sung W-J, Ahn H-G, Kim J-B, Choi S-G (2018) Protecting end-device from replay attack on LoRaWAN, in 2018 20th International Conference on Advanced Communication Technology (ICACT), pp 167–171
9.
go back to reference Na S, Hwang D, Shin W, Kim K-H (2017) Scenario and countermeasure for replay attack using join request messages in LoRaWAN, in Information Networking (ICOIN), 2017 International Conference on, pp 718–720 Na S, Hwang D, Shin W, Kim K-H (2017) Scenario and countermeasure for replay attack using join request messages in LoRaWAN, in Information Networking (ICOIN), 2017 International Conference on, pp 718–720
10.
go back to reference Aras E, Ramachandran GS, Lawrence P, Hughes D (2017) Exploring the security vulnerabilities of lora. In Cybernetics (CYBCONF), 2017 3rd IEEE International Conference on, pp 1–6 Aras E, Ramachandran GS, Lawrence P, Hughes D (2017) Exploring the security vulnerabilities of lora. In Cybernetics (CYBCONF), 2017 3rd IEEE International Conference on, pp 1–6
11.
go back to reference Yang X, Karampatzakis E, Doerr C, Kuipers F (2018) Security vulnerabilities in LoRaWAN. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), pp 129–140 Yang X, Karampatzakis E, Doerr C, Kuipers F (2018) Security vulnerabilities in LoRaWAN. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), pp 129–140
12.
go back to reference Danish SM, Lestas M, Qureshi HK, Zhang K, Asif W, Rajarajan M (2020) Securing the LoRaWAN join procedure using blockchains. Cluster Comput, pp 1–16 Danish SM, Lestas M, Qureshi HK, Zhang K, Asif W, Rajarajan M (2020) Securing the LoRaWAN join procedure using blockchains. Cluster Comput, pp 1–16
14.
go back to reference Mikhaylov K, Fujdiak R, Pouttu A, Miroslav V, Malina L, Mlynek P (2019) Energy attack in LoRaWAN: experimental validation. In Proceedings of the 14th International Conference on Availability, Reliability and Security, pp 1–6 Mikhaylov K, Fujdiak R, Pouttu A, Miroslav V, Malina L, Mlynek P (2019) Energy attack in LoRaWAN: experimental validation. In Proceedings of the 14th International Conference on Availability, Reliability and Security, pp 1–6
15.
go back to reference Bidgoly AJ, Bidgoly HJ (2019) A Novel Chaining Encryption Algorithm for LPWAN IoT Network. IEEE Sens J, pp 1–8 Bidgoly AJ, Bidgoly HJ (2019) A Novel Chaining Encryption Algorithm for LPWAN IoT Network. IEEE Sens J, pp 1–8
16.
go back to reference Alizadeh F, Bidgoly AJ (2020) Cipher chaining key re-synchronization in LPWAN IoT network using a deep learning approach. Comput Networks 179:1–33CrossRef Alizadeh F, Bidgoly AJ (2020) Cipher chaining key re-synchronization in LPWAN IoT network using a deep learning approach. Comput Networks 179:1–33CrossRef
17.
go back to reference Abu Al-Haija Q, Zein-Sabatto S (2020) An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks. Electronic, pp 1–26 Abu Al-Haija Q, Zein-Sabatto S (2020) An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks. Electronic, pp 1–26
18.
go back to reference Al-Haija Abu (2021) Qasem and Al-Badawi. Attack-Aware IoT network traffic routing leveraging ensemble learning, Sensors, Ahmad, pp 1–16 Al-Haija Abu (2021) Qasem and Al-Badawi. Attack-Aware IoT network traffic routing leveraging ensemble learning, Sensors, Ahmad, pp 1–16
19.
go back to reference Albulayhi K, Abu Al-Haija, Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT (2022) IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci 1–30 Albulayhi K, Abu Al-Haija, Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT (2022) IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci 1–30
20.
go back to reference Abu Al-Haija Q, Al-Dala’ien MA (2022) ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks. J Sens Actuator Netw 1–18 Abu Al-Haija Q, Al-Dala’ien MA (2022) ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks. J Sens Actuator Netw 1–18
21.
go back to reference Thomas J, Cherian S, Chandran S, Pavithran V (2020) Man in the Middle Attack Mitigation in LoRaWAN. International Conference on Inventive Computation Technologies (ICICT), pp 353–358 Thomas J, Cherian S, Chandran S, Pavithran V (2020) Man in the Middle Attack Mitigation in LoRaWAN. International Conference on Inventive Computation Technologies (ICICT), pp 353–358
22.
go back to reference Davcev D, Mitreski K, Trajkovic S, Nikolovski V, Koteli N (2018) IoT agriculture system based on LoRaWAN. 14th IEEE International Workshop on Factory Communication Systems (WFCS), pp 1–4 Davcev D, Mitreski K, Trajkovic S, Nikolovski V, Koteli N (2018) IoT agriculture system based on LoRaWAN. 14th IEEE International Workshop on Factory Communication Systems (WFCS), pp 1–4
23.
go back to reference Divya Priyadharshini M, Divya R, Ponmurugan P, Balamurugan S (2020) Security Protocols for Mobile Communications. Des Anal Secur Protoc Commun 243–263 Divya Priyadharshini M, Divya R, Ponmurugan P, Balamurugan S (2020) Security Protocols for Mobile Communications. Des Anal Secur Protoc Commun 243–263
24.
go back to reference Benkahla N, Belgacem B, Frikha M (2018) Security analysis in Enhanced LoRaWAN duty cycle. Seventh International Conference on Communications and Networking (ComNet), pp 1–7 Benkahla N, Belgacem B, Frikha M (2018) Security analysis in Enhanced LoRaWAN duty cycle. Seventh International Conference on Communications and Networking (ComNet), pp 1–7
25.
go back to reference Naoui S, Elhdhili ME, Saidane LA (2020) Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security. Wirel Pers Commun 110(4):2109–2130CrossRef Naoui S, Elhdhili ME, Saidane LA (2020) Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security. Wirel Pers Commun 110(4):2109–2130CrossRef
26.
go back to reference Lee J, Hwang D, Park J, Kim K-H (2017) Risk analysis and countermeasure for bit-flipping attack in LoRaWAN, in Information Networking (ICOIN), International Conference, pp 549–551 Lee J, Hwang D, Park J, Kim K-H (2017) Risk analysis and countermeasure for bit-flipping attack in LoRaWAN, in Information Networking (ICOIN), International Conference, pp 549–551
27.
go back to reference Noura H, Hatoum T, Salman O, Yaacoub JP, Chehab A (2020) LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet of Things, pp 1–37 Noura H, Hatoum T, Salman O, Yaacoub JP, Chehab A (2020) LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet of Things, pp 1–37
28.
go back to reference Raad N, Hasan T, Chalak A, Waleed J (2019) Secure data in lorawan network by adaptive method of elliptic-curve cryptography. International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA), pp 1–6 Raad N, Hasan T, Chalak A, Waleed J (2019) Secure data in lorawan network by adaptive method of elliptic-curve cryptography. International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA), pp 1–6
29.
go back to reference Benkahla N, Tounsi H, Song YQ, Frikha M (2018) Enhanced dynamic duty cycle in LoRaWAN network. In International Conference on Ad-Hoc Networks and Wireless, pp 147–162 Benkahla N, Tounsi H, Song YQ, Frikha M (2018) Enhanced dynamic duty cycle in LoRaWAN network. In International Conference on Ad-Hoc Networks and Wireless, pp 147–162
31.
go back to reference de Carvalho Silva J, Rodrigues JJ, Alberti AM, Solic P, Aquino AL (2017) LoRaWAN–A low power WAN protocol for Internet of Things: A review and opportunities. 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech), pp 1–6 de Carvalho Silva J, Rodrigues JJ, Alberti AM, Solic P, Aquino AL (2017) LoRaWAN–A low power WAN protocol for Internet of Things: A review and opportunities. 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech), pp 1–6
32.
go back to reference Herrero R (2022) LPWAN Technologies. In Fundamentals of IoT Communication Technologies, pp. 193-212. Springer, Cham Herrero R (2022) LPWAN Technologies. In Fundamentals of IoT Communication Technologies, pp. 193-212. Springer, Cham
Metadata
Title
Bit flipping attack detection in low power wide area networks using a deep learning approach
Authors
Faezeh Alizadeh
Amir Jalaly Bidgoly
Publication date
13-06-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01511-y

Other articles of this Issue 4/2023

Peer-to-Peer Networking and Applications 4/2023 Go to the issue

Premium Partner