Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Jamming of LoRa PHY and Countermeasure

View through CrossRef
LoRaWAN forms a one-hop star topology where LoRa nodes send data via one-hop uplink transmission to a LoRa gateway. If the LoRa gateway can be jammed by attackers, it may not be able to receive any data from any nodes in the network. Our empirical study shows that although the LoRa physical layer (PHY) is robust and resilient by design, it is still vulnerable to synchronized jamming chirps. Potential protection solutions (e.g., collision recovery, parallel decoding) may fail to extract LoRa packets if an attacker transmits synchronized jamming chirps at higher power. To protect the LoRa PHY from such attacks, we propose a new protection method that can separate LoRa chirps from jamming chirps by leveraging their difference in power domain. We note that the new protection solution is orthogonal to existing solutions that leverage the chirp misalignment in the time domain or the frequency disparity in the frequency domain. We conduct experiments with COTS LoRa nodes and software-defined radios with varied experiment settings such as different spreading factors, bandwidths, and code rates. Results show that synchronized jamming chirps at high power can jam all previous solutions, whereas our protection solution can effectively protect LoRa gateways from the jamming attacks.
Title: Jamming of LoRa PHY and Countermeasure
Description:
LoRaWAN forms a one-hop star topology where LoRa nodes send data via one-hop uplink transmission to a LoRa gateway.
If the LoRa gateway can be jammed by attackers, it may not be able to receive any data from any nodes in the network.
Our empirical study shows that although the LoRa physical layer (PHY) is robust and resilient by design, it is still vulnerable to synchronized jamming chirps.
Potential protection solutions (e.
g.
, collision recovery, parallel decoding) may fail to extract LoRa packets if an attacker transmits synchronized jamming chirps at higher power.
To protect the LoRa PHY from such attacks, we propose a new protection method that can separate LoRa chirps from jamming chirps by leveraging their difference in power domain.
We note that the new protection solution is orthogonal to existing solutions that leverage the chirp misalignment in the time domain or the frequency disparity in the frequency domain.
We conduct experiments with COTS LoRa nodes and software-defined radios with varied experiment settings such as different spreading factors, bandwidths, and code rates.
Results show that synchronized jamming chirps at high power can jam all previous solutions, whereas our protection solution can effectively protect LoRa gateways from the jamming attacks.

Related Results

An Overview of Late-onset Rheumatoid Arthritis
An Overview of Late-onset Rheumatoid Arthritis
It is well known that rheumatoid arthritis (RA) has an increased incidence in young and middle-aged adults. When this disease begins in adults between the ages of 60 and 65, it is ...
Cooperative Jamming Resource Allocation with Joint Multi-Domain Information Using Evolutionary Reinforcement Learning
Cooperative Jamming Resource Allocation with Joint Multi-Domain Information Using Evolutionary Reinforcement Learning
Addressing the formidable challenges posed by multiple jammers jamming multiple radars, which arise from spatial discretization, many degrees of freedom, numerous model input param...
Radar Anti-Jamming Countermeasures Intelligent Decision-Making: A Partially Observable Markov Decision Process Approach
Radar Anti-Jamming Countermeasures Intelligent Decision-Making: A Partially Observable Markov Decision Process Approach
Current electronic warfare jammers and radar countermeasures are characterized by dynamism and uncertainty. This paper focuses on a decision-making framework of radar anti-jamming ...
Assessment of the Applicability of Lora Technology in Smart Metering
Assessment of the Applicability of Lora Technology in Smart Metering
Рассмотрен вопрос применения технологии Lora для взаимодействия с современными электросчетчиками. Даны предпосылки применения, компоненты и возможности технологии Lora. Описана тес...
Application of the low-rank adaptation method on the example of fine-tuning a latent diffusion model
Application of the low-rank adaptation method on the example of fine-tuning a latent diffusion model
This article explores the Low-Rank Adaptation (LoRA) method, a fast fine-tuning technique for large-parameter neural networks, and its potential application in various fields, with...
Survey on cognitive anti‐jamming communications
Survey on cognitive anti‐jamming communications
In this study, the authors review various jamming and anti‐jamming strategies in the context of cognitive radios (CRs). The study explores different jamming models and classifies t...
A Fast Anti-Jamming Algorithm Based on Imitation Learning for WSN
A Fast Anti-Jamming Algorithm Based on Imitation Learning for WSN
Wireless sensor networks (WSNs), integral components underpinning the infrastructure of the internet of things (IoT), confront escalating threats originating from attempts at malic...
A SURVEY ON JAMMING AND FRIENDLY JAMMING TECHNIQUES
A SURVEY ON JAMMING AND FRIENDLY JAMMING TECHNIQUES
Wireless communication is the most growing area in the field of communications and wireless networks as their key components become increasingly important in our life. Despite the ...

Back to Top