{"id":40,"date":"2023-08-22T07:11:49","date_gmt":"2023-08-22T07:11:49","guid":{"rendered":"https:\/\/openiot.in\/?p=40"},"modified":"2023-08-22T07:19:15","modified_gmt":"2023-08-22T07:19:15","slug":"secure-lora-v1-0","status":"publish","type":"post","link":"https:\/\/openiot.in\/index.php\/2023\/08\/22\/secure-lora-v1-0\/","title":{"rendered":"Secure Lora v1.0"},"content":{"rendered":"\n<p>Security issues are common in any communication system. Several critical security flaws are present in the case of Lora's communication. To prevent this, we must monitor the same as the first stage. Chirpstack provides an API to capture the live frame, which includes uplink and downlinks. Using these captured frames, we can analyse the security threats that we currently face. We created security monitoring scripts for these types of vulnerabilities.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"576\" src=\"https:\/\/openiot.in\/wp-content\/uploads\/2023\/08\/secure_lora-2-1024x576.png\" alt=\"\" class=\"wp-image-47\" srcset=\"https:\/\/openiot.in\/wp-content\/uploads\/2023\/08\/secure_lora-2-1024x576.png 1024w, https:\/\/openiot.in\/wp-content\/uploads\/2023\/08\/secure_lora-2-300x169.png 300w, https:\/\/openiot.in\/wp-content\/uploads\/2023\/08\/secure_lora-2-768x432.png 768w, https:\/\/openiot.in\/wp-content\/uploads\/2023\/08\/secure_lora-2-320x180.png 320w, https:\/\/openiot.in\/wp-content\/uploads\/2023\/08\/secure_lora-2.png 1366w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This system is able to monitor the following attacks:<\/p>\n\n\n\n<ul>\n<li>Packet flooding<\/li>\n\n\n\n<li>Join request replay<\/li>\n\n\n\n<li>DevNonce reset<\/li>\n\n\n\n<li>Device reset<\/li>\n\n\n\n<li>Packet loss(WIP)<\/li>\n\n\n\n<li>Active\/Inactive devices<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/gitlab.com\/icfoss\/OpenIoT\/lorawan-security-monitoring\">Gitlab Repository<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security issues are common in any communication system. Several critical security flaws are present in the case of Lora's communication. To prevent this, we must monitor the same as the first stage. Chirpstack provides an API to capture the live frame, which includes uplink and downlinks. Using these captured frames, we can analyse the security [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":43,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/posts\/40"}],"collection":[{"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":5,"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/posts\/40\/revisions"}],"predecessor-version":[{"id":51,"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/posts\/40\/revisions\/51"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/media\/43"}],"wp:attachment":[{"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/media?parent=40"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/categories?post=40"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/openiot.in\/index.php\/wp-json\/wp\/v2\/tags?post=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}