Low-power wide-area network technologies such as LoRaWAN are promising for collecting low-rate monitoring data from geographically distributed sensors, in which timestamping the sensor data is a critical system function. This paper considers a synchronization-free approach to timestamping LoRaWAN uplink data based on signal arrival time at the gateway, which well matches LoRaWAN's one-hop star topology and releases bandwidth from transmitting timestamps and synchronizing end devices' clocks at all times. However, we show that this approach is susceptible to a {\em frame delay attack} consisting of malicious frame collision and delayed replay. Real experiments show that the attack can affect the end devices in large areas up to about $50,000\,\text{m}^2$. In a broader sense, the attack threatens any system functions requiring timely deliveries of LoRaWAN frames. To address this threat, we propose a $\mathsf{LoRaTS}$ gateway design that integrates a commodity LoRaWAN gateway and a low-power software-defined radio receiver to track the inherent frequency biases of the end devices. Based on an analytic model of LoRa's chirp spread spectrum modulation, we develop signal processing algorithms to estimate the frequency biases with high accuracy beyond that achieved by LoRa's default demodulation. The accurate frequency bias tracking capability enables the detection of the attack that introduces additional frequency biases. We also investigate and implement a more crafty attack that uses advanced radio apparatuses to eliminate the frequency biases. To address this crafty attack, we propose a pseudorandom interval hopping scheme to enhance our frequency bias tracking approach. Extensive experiments show the effectiveness of our approach in deployments with real affecting factors such as temperature variations.
翻译:低功率广域网技术,如LoRawAN,对于从地理分布的传感器收集低功率监测数据来说很有希望,这种低功率的广域网络技术,例如LoRawAN,对于从地理分布的传感器收集低效监测数据而言,标记传感器数据是一个关键的系统功能。本文认为,根据网关的信号到达时间,对LoRawAN上链数据进行不同步的打印,这完全符合LoRawang的一线恒星地形图,并且从传输时标和同步终端装置时钟中释放带宽。然而,我们表明,这一方法很容易受到由恶意框架碰撞和延迟重现构成的反频框架延迟攻击攻击。真正的实验显示,攻击可以影响大区域的末端装置,高达50 000美元,\ text{m%2$。从更广泛的意义上讲,攻击威胁到任何需要及时交付LoRawAN框架的系统功能。为了应对这一威胁,我们建议用一个$mathfsf{LaTATS}开关设计的网关网格设计, 将一个商品的额外偏差偏差路路路路路路路路路路路路路路接收器接收器来追踪系统,我们通过测测测路机的测测测测路机的系统, 显示系统显示系统到高路路路路路路路路路路路路路路。我们测路路路路路路机的测路。我们通过甚甚甚甚甚甚甚甚高。我们测路路路路路路路。