No results match your search criteria.
2019
Completed
Security Analysis of LoRaWAN: An Experimental Evaluation of Attacks
Supervisor:
Lars Almon
Flor Maria Alvarez Zurita
Read the thesis
Low-power wide-area networks (LPWAN) are becoming the wireless backbone for modern business processes and municipal administration. LoRaWAN, which stands for long-range wide-area network, is a recent medium access control (MAC) layer protocol competing for this market. It stands out by its open operator model and a novel modulation technique. With LoRaWAN and other communication technologies are becoming a dependency for more and more aspects of today's society, the question for their security and reliability comes up. Previous researches on the topic have already revealed vulnerabilities in the first LoRaWAN specification, which have been partly mitigated in the most recent LoRaWAN 1.1. However, related studies often provide only theoretical results or consider practical scenarios only on a specific, small scale. In this thesis, we present a LoRaWAN security evaluation framework that allows field-testing the security and reliability characteristics of actual LoRaWAN deployments. This provides not only reproducible results but also allows making a comparison between defined versions of the specification and LoRaWAN software. Before expounding implementation details, we provide a literature survey on LoRaWAN vulnerabilities and attacks to identify interesting aspects for further evaluation. From our experimental results, we show that jamming is a serious threat to the availability of LoRaWAN networks. Furthermore, we demonstrate the practical applicability of two replay attacks against a selection of LoRaWAN software and illustrate why they will remain relevant for years due to backward compatibility.
2019
Completed
Bluetooth Mesh Network Security Analysis: An Experimental Evaluation of Attacks Using Btlejack
Supervisor:
Flor Maria Alvarez Zurita
Lars Almon
2019
Completed
Secure Device Pairing Using Short-Range Acoustic Communication
Supervisor:
Flor Maria Alvarez Zurita
Jiska Classen
2017
Completed
Reverse Engineering the Apple Wireless Direct Link Protocol
Supervisor:
Milan Stute
Flor Maria Alvarez Zurita
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented 802.11 based peer-to-peer protocol. It is implemented in all of Apple's operating systems. In this thesis a reverse engineering method using binary analysis complemented by runtime analysis with traces and logs was applied. We found that each device in AWDL provides its own channel sequence. An elected master node is used to synchronize these sequences. Outside these windows of time, devices can use their wireless radio for other protocols or save energy by turning it off. Each node adapts its channel sequence, e.g. depending on network load, shifting the ratio between infrastructure and peer-to-peer Wi-Fi. This thesis also provides a first analysis of AWDL, includes the frame format documentation and presents a Wireshark dissector and a prototype implementation for AWDL.
2016
Completed
A Framework for Adaptive Energy-efficient Neighbour Discovery in Oppertunistic Networks
Supervisor:
Flor Maria Alvarez Zurita
2016
Completed
Secure key exchange protocol for a group communication during emergency responses
Supervisor:
Flor Maria Alvarez Zurita