Resumen |
LoRaWAN as one of the newest protocols in the Internet of Things ecosystem represents a whole new area in cybersecurity research. In this protocol, security is focused on data integrity and confidentiality and most the research that analyse its security only examined the availability property of the protocol from the performance or join-procedure perspective. In this paper we aim to provide evidence supporting a major interest in the availability property. Therefore we describe five identified vulnerabilities that have not been thoroughly analysed in the literature together with exemplification of how to exploit them to perform cyberattacks, specifically for bidirectional communication. We also make the case for IoT gateway as a main target for the Committing Uplink/Downlink Communication, Theft the Gateway for Packet Monitoring, Data Loss, Delay in Data Reception and Battery Consumption attacks. We also provide details of the experiments and discussion of the obtained data. Finally, we include a discussion of some mitigations activities for such vulnerabilities. |