Proteção de Dados em Dispositivos IoT em Redes LoRaWAN
Resumo
As redes de baixa potência e longo alcance (LPWAN), como o LoRaWAN, são amplamente usadas em aplicações IoT, mas enfrentam desafios em segurança. O objetivo do trabalho é mapear as principais vulnerabilidades em redes LoRaWAN, identificar as soluções propostas e destacar as lacunas existentes, contribuindo para a segurança e confiabilidade dessas redes. Os resultados incluem a identificação de vulnerabilidades como jamming, replay de pacotes, spoofing e DDoS, além da análise de soluções como o gerenciamento dinâmico de chaves (OTAA), o protocolo CRAM e o algoritmo REBEB. Destacam-se tendências promissoras, como o aprendizado de máquina, para abordagens mais adaptativas.Referências
Ahmar, A.-U.-H., Aras, E., Nguyen, T. D., Michiels, S., Joosen, W., and Hughes, D. (2023). Design of a robust mac protocol for lora. International Journal of Sensor Networks, 38(2):133–146.
Al-Shareeda, M. A., Alsadhan, A. A., Qasim, H. H., and Manickam, S. (2023). Long range technology for internet of things: review, challenges, and future directions. Bulletin of Electrical Engineering and Informatics, 12(6):3758 a 3767.
Chacko, S. and Job, D. (2018). Security mechanisms and vulnerabilities in lpwan. In IOP Conference Series: Materials Science and Engineering, volume 396, page 012027.
Han, B., Peng, S., Wu, C., Wang, X., and Wang, B. (2021). Lora-based physical layer key generation for secure v2v/v2i communications. IEEE Internet of Things Journal, 9(14):11803–11815.
Hayati, N., Windarta, S., Suryanegara, M., Pranggono, B., and Ramli, K. (2022). A novel session key update scheme for lorawan. Journal of Information Security and Applications, 68:103210.
LoRa Alliance (2024). About lorawan®. [link]. Acesso em: 5 nov. 2024.
LyuLiang, Z., Kumar, Q., Singh, S. K., and Wang, Q. (2021). AI-empowered IoT Security for Smart Cities. ACM Transactions on Internet Technology, 21(4):Article 99.
Mai, T., Yao, H., Zhang, N., He, W., Guo, D., and Guizani, M. (2022). Transfer reinforcement learning aided distributed network slicing optimization in industrial iot. IEEE Internet of Things Journal, 9(17):16572–16585.
Moher, D., Liberati, A., Tetzlaff, J., and Altman, D. G. (2009). Preferred reporting items for systematic reviews and meta-analyses: The prisma statement. PLoS Medicine, 6(7):e1000097.
Mousavi, S. M., Khademzadeh, A., and Rahmani, A. M. (2022). Cognitive long-range: Towards efficient public communication infrastructure for internet of things. Journal of Network and Computer Applications, 200:103367.
Ramos, C., Moreira, A., and Santos, J. (2020). An autonomous low-power lora-based flood-monitoring system. ResearchGate, 10(2):45–57.
Saputro, M. Y. A. and Sari, R. F. (2022). Performance evaluation of broadcast domain on the lightweight multi-fog blockchain platform for a lora-based internet of things network. Journal of Communications and Networks, 24(2):145–156.
Szewczyk, J., Nowak, M., Remlein, P., and Głowacka, A. (2022). Lorawan communication implementation. International Journal of Electronics and Telecommunications, 68(4):841–854.
Wong, A. W.-L., Goh, S. L., Hasan, M. K., and Fattah, S. (2024). Multi-hop and mesh for lora networks: Recent advancements, issues, and recommended applications. ACM Computing Surveys, 56(6):1–43.
Al-Shareeda, M. A., Alsadhan, A. A., Qasim, H. H., and Manickam, S. (2023). Long range technology for internet of things: review, challenges, and future directions. Bulletin of Electrical Engineering and Informatics, 12(6):3758 a 3767.
Chacko, S. and Job, D. (2018). Security mechanisms and vulnerabilities in lpwan. In IOP Conference Series: Materials Science and Engineering, volume 396, page 012027.
Han, B., Peng, S., Wu, C., Wang, X., and Wang, B. (2021). Lora-based physical layer key generation for secure v2v/v2i communications. IEEE Internet of Things Journal, 9(14):11803–11815.
Hayati, N., Windarta, S., Suryanegara, M., Pranggono, B., and Ramli, K. (2022). A novel session key update scheme for lorawan. Journal of Information Security and Applications, 68:103210.
LoRa Alliance (2024). About lorawan®. [link]. Acesso em: 5 nov. 2024.
LyuLiang, Z., Kumar, Q., Singh, S. K., and Wang, Q. (2021). AI-empowered IoT Security for Smart Cities. ACM Transactions on Internet Technology, 21(4):Article 99.
Mai, T., Yao, H., Zhang, N., He, W., Guo, D., and Guizani, M. (2022). Transfer reinforcement learning aided distributed network slicing optimization in industrial iot. IEEE Internet of Things Journal, 9(17):16572–16585.
Moher, D., Liberati, A., Tetzlaff, J., and Altman, D. G. (2009). Preferred reporting items for systematic reviews and meta-analyses: The prisma statement. PLoS Medicine, 6(7):e1000097.
Mousavi, S. M., Khademzadeh, A., and Rahmani, A. M. (2022). Cognitive long-range: Towards efficient public communication infrastructure for internet of things. Journal of Network and Computer Applications, 200:103367.
Ramos, C., Moreira, A., and Santos, J. (2020). An autonomous low-power lora-based flood-monitoring system. ResearchGate, 10(2):45–57.
Saputro, M. Y. A. and Sari, R. F. (2022). Performance evaluation of broadcast domain on the lightweight multi-fog blockchain platform for a lora-based internet of things network. Journal of Communications and Networks, 24(2):145–156.
Szewczyk, J., Nowak, M., Remlein, P., and Głowacka, A. (2022). Lorawan communication implementation. International Journal of Electronics and Telecommunications, 68(4):841–854.
Wong, A. W.-L., Goh, S. L., Hasan, M. K., and Fattah, S. (2024). Multi-hop and mesh for lora networks: Recent advancements, issues, and recommended applications. ACM Computing Surveys, 56(6):1–43.
Publicado
24/04/2025
Como Citar
RODRIGUES, Roni; MARTINS, Claudia Aparecida; ARAÚJO, Nelcileno Virgílio de Souza; CRUZ NETO, Constantino Dias da.
Proteção de Dados em Dispositivos IoT em Redes LoRaWAN. In: ESCOLA REGIONAL DE SISTEMAS DE INFORMAÇÃO DE MATO GROSSO, 1. , 2025, Cuiabá/MT.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2025
.
p. 11-20.
DOI: https://doi.org/10.5753/ersimt.2025.8039.
