skip to main content
10.1145/3507657.3528556acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections

Device Re-identification in LoRaWAN through Messages Linkage

Authors Info & Claims
Published:16 May 2022Publication History

ABSTRACT

In LoRaWAN networks, devices are identified by two identifiers: a globally unique and stable one called DevEUI, and an ephemeral and randomly assigned pseudonym called DevAddr. The association between those identifiers is only known by the network and join servers, and is not available to a passive eavesdropper.

In this work, we consider the problem of linking the DevAddr with the corresponding DevAddr based on passive observation of the LoRa traffic transmitted over the air. Leveraging metadata exposed in LoRa frames, we devise a technique to link two messages containing respectively the DevEUI and the DevAddr, thus identifying the link between those identifiers. The approach is based on machine learning algorithms using various pieces of information including timing, signal strength, and fields of the frames. Based on an evaluation using a real-world dataset of 11 million messages, with ground truth available, we show that multiple machine learning models are able to reliably link those identifiers. The best of them achieves an impressive true positive rate of over 0.8 and a false positive rate of 0.001.

References

  1. Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-Boo: i See Your Smart Home Activities, Even Encrypted!. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM. https://doi.org/10.1145/3395351.3399421Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Lucas Ancian and Mathieu Cunche. 2020. Re-identifying addresses in LoRaWAN networks. Unpublished Research Report. Inria Rhône-Alpes; INSA de Lyon. https://hal.inria.fr/hal-02926894Google ScholarGoogle Scholar
  3. Noah Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, and Nick Feamster. 2019. Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 3 (July 2019), 128--148. https://doi.org/10.2478/popets-2019-0040Google ScholarGoogle ScholarCross RefCross Ref
  4. Emekcan Aras, Nicolas Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, and Danny Hughes. 2017Selective Jamming of LoRaWAN using Commodity Hardware. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 363--372. https://doi.org/10.1145/3144457.3144478Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Johannes K Becker, David Li, and David Starobinski. 2019. Tracking Anonymized Bluetooth Devices. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 3 (July 2019), 50--65. https://doi.org/10.2478/popets-2019-0036Google ScholarGoogle ScholarCross RefCross Ref
  6. Davide Chicco and Giuseppe Jurman. 2020. The Advantages of the Matthews Correlation Coefficient (MCC ) over F1 Score and Accuracy in Binary Classification Evaluation. BMC Genomics, Vol. 21, 1 (Dec. 2020), 6. https://doi.org/10.1186/s12864-019-6413-7Google ScholarGoogle ScholarCross RefCross Ref
  7. LoRa Alliance Technical Committee. 2017. LoRaWAN ® Specification v1.1.Google ScholarGoogle Scholar
  8. Bogdan Copos, Karl Levitt, Matt Bishop, and Jeff Rowe. 2016. Is Anybody Home? Inferring Activity From Smart Home Network Traffic. In 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 245--251. https://doi.org/10.1109/SPW.2016.48Google ScholarGoogle Scholar
  9. Rachel L. Finn, David Wright, and Michael Friedewald. 2013. Seven Types of Privacy. In European Data Protection: Coming of Age. https://doi.org/10.1007/978-94-007-5170-5_1Google ScholarGoogle Scholar
  10. Dalton A. Hahn, Arslan Munir, and Vahid Behzadan. 2021. Security and Privacy Issues in Intelligent Transportation Systems: Classification and Challenges. IEEE Intell. Transp. Syst. Mag., Vol. 13, 1 (2021), 181--196.Google ScholarGoogle ScholarCross RefCross Ref
  11. Jetmir Haxhibeqiri, Eli De Poorter, Ingrid Moerman, and Jeroen Hoebeke. 2018. A Survey of LoRaWAN for IoT: From Technology to Application. Sensors, Vol. 18, 11 (Nov. 2018), 3995. https://doi.org/10.3390/s18113995Google ScholarGoogle ScholarCross RefCross Ref
  12. Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A Highly Efficient Gradient Boosting Decision Tree. Advances in neural information processing systems, Vol. 30 (2017), 3146--3154.Google ScholarGoogle Scholar
  13. Ron Kohavi. 1995. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection. In Ijcai, Vol. 14. 1137--1145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, and Srdjan Čpkun. 2018. I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '18. https://doi.org/10.1145/3212480.3212508Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Norbert Ludant, Tien D. Vo-Huu, Sashank Narain, and Guevara Noubir. 2021. Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1318--1331. https://doi.org/10.1109/SP40001.2021.00102Google ScholarGoogle Scholar
  16. Jeremy Martin, Erik Rye, and Robert Beverly. 2016. Decomposition of MAC address structure for granular device inference. In Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 78--88. https://doi.org/10.1145/2991079.2991098Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research, Vol. 12 (2011), 2825--2830.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Toni Perković, Hrvoje Rude?, Slaven Damjanović, and Antun Nakić. 2021. Low-Cost Implementation of Reactive Jammer on LoRaWAN Network. Electronics, Vol. 10, 7 (April 2021), 864. https://doi.org/10.3390/electronics10070864Google ScholarGoogle ScholarCross RefCross Ref
  19. Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, and Bart Preneel. 2017. Physical-Layer Fingerprinting of LoRa Devices Using Supervised and Zero-Shot Learning. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 58--63. https://doi.org/10.1145/3098243.3098267Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Juan D. Rodriguez, Aritz Perez, and Jose A. Lozano. 2009. Sensitivity Analysis of K-Fold Cross Validation in Prediction Error Estimation. IEEE transactions on pattern analysis and machine intelligence, Vol. 32, 3 (2009), 569--575.Google ScholarGoogle Scholar
  21. Pietro Spadaccino, Domenico Garlisi, Francesca Cuomo, Giorgio Pillon, and Patrizio Pisani. 2021. Discovery Privacy Threats via Device De-Anonymization in LoRaWAN. In 19th Mediterranean Communication and Computer Networking Conference. 1--8. https://doi.org/10.1109/MedComNet52149.2021.9501247Google ScholarGoogle ScholarCross RefCross Ref
  22. Nuno Torres, Pedro Pinto, and Sérgio Ivan Lopes. 2021. Security Vulnerabilities in LPWANs -- An Attack Vector Analysis for the IoT Ecosystem. Applied Sciences, Vol. 11, 7 (Jan. 2021), 3176. https://doi.org/10.3390/app11073176Google ScholarGoogle ScholarCross RefCross Ref
  23. Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, and Frank Piessens. 2016. Why MAC Address Randomization is Not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). ACM, 413--424. https://doi.org/10.1145/2897845.2897883Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Sanjay Yadav and Sanyam Shukla. 2016. Analysis of K-Fold Cross-Validation over Hold-out Validation on Colossal Datasets for Quality Classification. In 2016 IEEE 6th International Conference on Advanced Computing (IACC ). IEEE, 78--83.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Device Re-identification in LoRaWAN through Messages Linkage

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader