<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.0" specific-use="sps-1.6" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">teclo</journal-id>
			<journal-title-group>
				<journal-title>TecnoLógicas</journal-title>
				<abbrev-journal-title abbrev-type="publisher">TecnoL.</abbrev-journal-title>
			</journal-title-group>
			<issn pub-type="ppub">0123-7799</issn>
			<issn pub-type="epub">2256-5337</issn>
			<publisher>
				<publisher-name>Instituto Tecnológico Metropolitano - ITM</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="doi">10.22430/22565337.1491</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Artículo de investigación</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Development and Testing of a Real-Time LoRawan Sniffer Based on GNU-Radio</article-title>
				<trans-title-group xml:lang="es">
					<trans-title>Desarrollo y prueba de un Sniffer en tiempo real de una red LoRawan usando GNU-Radio</trans-title>
				</trans-title-group>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<name>
						<surname>Bravo-Montoya</surname>
						<given-names>Andrés F.</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Rondón-Sanabria</surname>
						<given-names>Jefersson S.</given-names>
					</name>
					<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Gaona-Garcí</surname>
						<given-names>Elvis E.</given-names>
					</name>
					<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
				</contrib>
			</contrib-group>
			<aff id="aff1">
				<label>1</label>
				<institution content-type="original">Estudiante de Ingeniería Electrónica, Facultad de ingeniería, Universidad Distrital Francisco José de Caldas, Bogotá-Colombia, afbravom@correo.udistrital.edu.co</institution>
				<institution content-type="orgname">Universidad Distrital Francisco José de Caldas</institution>
				<addr-line>
					<named-content content-type="city">Bogotá</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>afbravom@correo.udistrital.edu.co</email>
			</aff>
			<aff id="aff2">
				<label>2</label>
				<institution content-type="original">Estudiante de Ingeniería Electrónica, Facultad de ingeniería, Universidad Distrital Francisco José de Caldas, Bogotá-Colombia, jsrondons@correo.udistrital.edu.co</institution>
				<institution content-type="orgname">Universidad Distrital Francisco José de Caldas</institution>
				<addr-line>
					<named-content content-type="city">Bogotá</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>jsrondons@correo.udistrital.edu.co</email>
			</aff>
			<aff id="aff3">
				<label>3</label>
				<institution content-type="original">PhD. en Ingeniería, Universidad Distrital Francisco José de Caldas, Bogotá-Colombia, egaona@udistrital.edu.co</institution>
				<institution content-type="orgname">Universidad Distrital Francisco José de Caldas</institution>
				<addr-line>
					<named-content content-type="city">Bogotá</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>egaona@udistrital.edu.co</email>
			</aff>
			<pub-date pub-type="epub-ppub">
				<season>Sep-Dec</season>
				<year>2019</year>
			</pub-date>
			<volume>22</volume>
			<issue>46</issue>
			<fpage>130</fpage>
			<lpage>139</lpage>
			<history>
				<date date-type="received">
					<day>26</day>
					<month>07</month>
					<year>2019</year>
				</date>
				<date date-type="accepted">
					<day>02</day>
					<month>09</month>
					<year>2019</year>
				</date>
			</history>
			<permissions>
				<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by-nc-sa/4.0/" xml:lang="en">
					<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License</license-p>
				</license>
			</permissions>
			<abstract>
				<title>Abstract</title>
				<p>This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.</p>
			</abstract>
			<trans-abstract xml:lang="es">
				<title>Resumen</title>
				<p>En este documento se muestran las vulnerabilidades presentes en una red de sensores inalámbricas implementada sobre una red de área amplia de largo alcance (LoRaWAN por sus siglas en inglés) LoRaWAN y se identifican los posibles ataques que se podrían realizar a la red usando sniffing y/o replay. Los ataques a la red se realizaron implementando un analizador de protocolos (Sniffer) para capturar los paquetes. El Sniffer se implementó utilizando el hardware RTL2832U y se visualizó en Wireshark, a través de GNU-Radio. Las pruebas mostraron que se pueden amenazar la disponibilidad y confidencialidad de los datos a través de ataques de replay con verificación en el LoRa server utilizando hardware HackRF One y GNU-Radio. Aunque la especificación LoRaWAN tiene contadores para evitar ataques de replay, bajo condiciones adecuadas se lograría vulnerar la red llegando a realizar la denegación del servicio del nodo en el servidor.</p>
			</trans-abstract>
			<kwd-group xml:lang="en">
				<title>Keywords:</title>
				<kwd>Internet of Things</kwd>
				<kwd>Long Range Wide Area Network</kwd>
				<kwd>Data Security</kwd>
				<kwd>Sniffer</kwd>
				<kwd>GNU-Radio</kwd>
			</kwd-group>
			<kwd-group xml:lang="es">
				<title>Palabras clave:</title>
				<kwd>Internet de las cosas</kwd>
				<kwd>red de área amplia de largo alcance</kwd>
				<kwd>seguridad de datos</kwd>
				<kwd>Sniffer</kwd>
				<kwd>analizador de protocolos</kwd>
				<kwd>GNU-Radio</kwd>
			</kwd-group>
			<counts>
				<fig-count count="9"/>
				<table-count count="0"/>
				<equation-count count="0"/>
				<ref-count count="16"/>
				<page-count count="10"/>
			</counts>
		</article-meta>
	</front>
	<body>
		<sec sec-type="intro">
			<title>1. INTRODUCTION</title>
			<p>The concept of Internet of Things (IoT) is relatively new; it first appeared between 2008 and 2009. It was defined by CISCO Internet Business Solutions Group (IBSG) as the time when more inanimate objects were connected to the Internet than people <sup>[</sup><xref ref-type="bibr" rid="B1"><sup>1</sup></xref><sup>]</sup>. Today, the IoT has a great impact on people’s daily life. New devices with Internet connection are constantly being created, so not only people but also objects use the network in order to operate properly or perform the tasks for which they were created.</p>
			<p>The IoT has environmental, industrial, urban, familiar, and personal applications. These new technologies offer great possibilities due to IoT’s ability to capture processes and transmit information <sup>[</sup><xref ref-type="bibr" rid="B2"><sup>2</sup></xref><sup>]</sup>.</p>
			<p>Although there are many advantages to IoT technologies, device security is a particularly important aspect, especially for wireless networks <sup>[</sup><xref ref-type="bibr" rid="B3"><sup>3</sup></xref><sup>]</sup>. The lack of a clear and well-defined information security policy inevitably leads to unauthorized access to a network or its devices, which can cause serious problems in most cases <sup>[</sup><xref ref-type="bibr" rid="B4"><sup>4</sup></xref><sup>]</sup>.</p>
			<p>Due to the great number of possibilities offered by the IoT, many companies have introduced innovative solutions to the market and, as a result, different infrastructures have been created for IoT management and control. Some of the solutions include SigFox, a telecommunications network with wide coverage focused on low-power devices <sup>[</sup><xref ref-type="bibr" rid="B5"><sup>5</sup></xref><sup>]</sup>; Symphony, specialized in overcoming difficulties in LoPoWANs (Low-Power Wide Area Networks) <sup>[</sup><xref ref-type="bibr" rid="B6"><sup>6</sup></xref><sup>]</sup>; networks, Zigbee, used in many applications due to its short range, low power consumption, low data transmission, and high security <sup>[</sup><xref ref-type="bibr" rid="B7"><sup>7</sup></xref><sup>]</sup>; and LoRaWANs, a scheme for addressing long-range links also known as LoRa <sup>[</sup><xref ref-type="bibr" rid="B8"><sup>8</sup></xref><sup>]</sup>. This set of standards includes new technological approaches to data transmission security <sup>[</sup><xref ref-type="bibr" rid="B9"><sup>9</sup></xref><sup>]</sup>. In addition to the development of infrastructure for IoT management, several technologies are widely used in the deployment and success of IoT-based products and services: radio frequency identification (RFID), wireless sensor networks (WSN), middleware, cloud computing, and IoT software applications <sup>[</sup><xref ref-type="bibr" rid="B10"><sup>10</sup></xref><sup>]</sup>. Wireless technologies change very rapidly; new products and features are continuously introduced. However, their new capabilities can produce new threats or vulnerabilities to equipment and data security.</p>
			<p>Networking with LoRa devices can be divided into two fundamental parts: one section from the end nodes to the gateway, and another section from the gateway to the servers. On the one hand, the second section includes several available security solutions, as this is not unique to LoRa devices. On the other hand, the first section may be susceptible to security attacks, so this part of the network cannot be considered a trusted network entity <sup>[</sup><xref ref-type="bibr" rid="B11"><sup>11</sup></xref><sup>]</sup>.</p>
			<p>When analyzing the vulnerabilities in the first section of the network, the possibility of making attacks to the network by using sniffing and/or relay techniques was found. From these possible attacks, it is clear that LoRa has inherent weaknesses caused by the compromises made in its design <sup>[</sup><xref ref-type="bibr" rid="B11"><sup>11</sup></xref><sup>]</sup>.</p>
			<p>As mentioned above, the main risk of these security failures is the theft of sensitive and/or confidential information; therefore, new methods are necessary to eliminate or minimize these failures <sup>[</sup><xref ref-type="bibr" rid="B12"><sup>12</sup></xref><sup>]</sup>.</p>
			<p>For this purpose, one of the most practical tools in network security is a sniffer. This tool is usually employed by hackers but also network managers to maintain the security level of their networks (identifying the vulnerabilities it may present, such as device A cannot establish communication with device B) and even to efficiently manage the network, since it can identify the stability of a network with tremendous ease and perform audits in a very short time.</p>
			<p>A sniffer records all the information that is sent in a wireless network, as well as any activity carried out. That is, it has the ability to capture and record any transfer of information, through which it is possible to discover bottlenecks in the network <sup>[</sup><xref ref-type="bibr" rid="B13"><sup>13</sup></xref><sup>]</sup>.</p>
			<p>This article is organized as follows: Section 2 describes the configuration and hardware used for testing. Section 3 reports the test results of network attacks and the discussion. Finally, Section 4 presents the conclusions and future research.</p>
		</sec>
		<sec sec-type="methods">
			<title>2. METHODOLOGY</title>
			<p>LoRaWAN defines two node activation procedures: 1) Over The Air Activation (OTAA), in which the final device sends a join request to the gateway and the gateway returns the data from the network server; and 2) Activation by Personalization (ABP), in which the required information is stored in the memory of the nodes, so communication is not necessary to join the network.</p>
			<p>In addition, LoRaWAN networks have two security layers: the “<italic>Network Session Key</italic>”, which ensures the authenticity of the node; and the “<italic>Application Session Key</italic>”, used for data reliability <sup>[</sup><xref ref-type="bibr" rid="B14"><sup>14</sup></xref><sup>]</sup>. However, in order to test the security provided by the protocol, some attacks were carried out on an A-class network. The measurements were taken with the hardware listed below:</p>
			<p>
				<list list-type="bullet">
					<list-item>
						<p>-MultiTech mDot nodes</p>
					</list-item>
					<list-item>
						<p>-LM35 temperature sensors</p>
					</list-item>
					<list-item>
						<p>-Pressure and temperature sensor BMP280</p>
					</list-item>
					<list-item>
						<p>-RTL2832U</p>
					</list-item>
					<list-item>
						<p>-HackRF One analyzer</p>
					</list-item>
					<list-item>
						<p>-Wireshark software</p>
					</list-item>
					<list-item>
						<p>-GNU-Radio</p>
					</list-item>
					<list-item>
						<p>-MultiTech gateway</p>
					</list-item>
				</list>
			</p>
			<p>The network was implemented with the previous hardware plus a network server that was also a LoRa server.</p>
			<sec>
				<title>2.1 Eavesdropping</title>
				<p>This kind of attack requires a sniffer to capture data passively; in this work packets sent from nodes to the gateway are captured by using GNU-Radio, Wireshark, and RLT2832U. <xref ref-type="fig" rid="f1">Fig. 1</xref>, shows the configuration used to implement the eavesdropping test. The four A-class nodes are configured in a star topology, in which the gateway and the sniffer receive the sent data.</p>
				<p>
					<fig id="f1">
						<label>Fig. 1</label>
						<caption>
							<title>Network Topology</title>
						</caption>
						<graphic xlink:href="2256-5337-teclo-22-46-00130-gf1.jpg"/>
						<attrib>Source: Authors.</attrib>
					</fig>
				</p>
				<p>A simple configuration in GNU-Radio is used to capture and send the data received by the sniffer. <xref ref-type="fig" rid="f2">Fig. 2</xref>, shows this arrangement with a Spread Factor (SF) of about only 12.</p>
				<p>
					<fig id="f2">
						<label>Fig. 2</label>
						<caption>
							<title>GNU-Radio blocks</title>
						</caption>
						<graphic xlink:href="2256-5337-teclo-22-46-00130-gf2.jpg"/>
						<attrib>Source: Authors.</attrib>
					</fig>
				</p>
				<p>LoRa Receiver blocks were obtained using the gr-lora repository <sup>[</sup><xref ref-type="bibr" rid="B15"><sup>15</sup></xref><sup>]</sup>. The RTL-SDR Source block enables the configuration of the hardware parameters of the RTL2832U sniffer (sample rate, center capture rate, and gain, among others). WX GUI blocks are employed to display the captured signal (Fast Fourier Transform and the signal spectrogram). LoRa Receiver blocks capture the frames received by the sniffer in a specific channel; in these blocks, it is possible to configure the central frequency, the reception channel, the signal bandwidth, and the propagation factor. Three blocks are used to capture the three possible channels in a transmission and, finally, the Message Socket Sink blocks allow GNU-Radio to communicate with Wireshark software and send the data captured to the port and IP address specified in the block as well as the LoRaWAN frame counter.</p>
			</sec>
			<sec>
				<title>2.2 Replay</title>
				<p>This attack, which consists in copying the transmitted signal to supplant the node, was implemented with a Software-Defined Radio (SDR) device. The device, a HackRF One, was configured through GNU-Radio, allowing it to make copies (<xref ref-type="fig" rid="f3">Fig. 3</xref>) of the signals transmitted by the nodes to send them later (<xref ref-type="fig" rid="f4">Fig. 4</xref>).</p>
				<p>
					<fig id="f3">
						<label>Fig. 3</label>
						<caption>
							<title>General RX configuration</title>
						</caption>
						<graphic xlink:href="2256-5337-teclo-22-46-00130-gf3.jpg"/>
						<attrib>Source: Authors.</attrib>
					</fig>
				</p>
				<p>
					<fig id="f4">
						<label>Fig. 4</label>
						<caption>
							<title>General TX configuration</title>
						</caption>
						<graphic xlink:href="2256-5337-teclo-22-46-00130-gf4.jpg"/>
						<attrib>Source: Authors.</attrib>
					</fig>
				</p>
				<p>The replay tests were performed with three configurations. The first one verified if the server accepted the data copied from the node. The second one copied the data without the join request. The third one used the frame counter.</p>
				<sec>
					<title>2.2.1 Configuration 1</title>
					<p>For this scenario, a malicious node was used to access the network by copying authentication data and some data messages collected by sensors in order to verify if the server accepted the copied messages. After copying the signals with the HackRF One, the authentic node was disconnected from the network and the signal replicas of the malicious node continued to be sent.</p>
				</sec>
				<sec>
					<title>2.2.2 Configuration 2</title>
					<p>In this test, the data was copied without the join-request, keeping the node connected in order to falsify the data.</p>
				</sec>
				<sec>
					<title>2.2.3 Configuration 3</title>
					<p>This configuration consisted in waiting until the sequential number of the frame-counter inside the message was restarted</p>
					<p>The test was performed while waiting for the counter to be reset to zero in order to send the copied data at the time the counter matches the counter of previously copied messages.</p>
				</sec>
			</sec>
		</sec>
		<sec sec-type="results|discussion">
			<title>3. RESULTS AND DISCUSSION</title>
			<p>The following are the results obtained after carrying out the attacks described above and a discussion about the possible causes that enabled them.</p>
			<sec>
				<title>3.1 Eavesdropping</title>
				<p>
					<xref ref-type="fig" rid="f5">Fig. 5</xref> shows the data captured in Wireshark, in which the received data that belongs to a specific node is discriminated. The captured data can be seen in hexadecimal format (but they are encrypted), and the data organized in the blocks sent by a UDP frame are located at the bottom.</p>
				<p>
					<fig id="f5">
						<label>Fig. 5</label>
						<caption>
							<title>Captured data</title>
						</caption>
						<graphic xlink:href="2256-5337-teclo-22-46-00130-gf5.jpg"/>
						<attrib>Source: Authors.</attrib>
					</fig>
				</p>
				<p>Evidently, the attack was successful. However, the implemented sniffer did not inform Wireshark of the response messages from the server to the nodes. In addition, the counter was not encrypted.</p>
			</sec>
			<sec>
				<title>3.2 Replay</title>
				<p>The results obtained with the different configurations described above are the following.</p>
				<sec>
					<title>3.2.1 Configuration 1</title>
					<p>In order to verify whether the attack was successful, the application response of a message sent by a genuine node was compared to the application response of a message sent by the malicious node. <xref ref-type="fig" rid="f6">Fig. 6</xref> and <xref ref-type="fig" rid="f7">Fig. 7</xref> show the application responses to the messages.</p>
					<p>
						<fig id="f6">
							<label>Fig. 6</label>
							<caption>
								<title>Messages sent by the real node</title>
							</caption>
							<graphic xlink:href="2256-5337-teclo-22-46-00130-gf6.jpg"/>
							<attrib>Source: Authors.</attrib>
						</fig>
					</p>
					<p>
						<fig id="f7">
							<label>Fig. 7</label>
							<caption>
								<title>Messages sent by the malicious node</title>
							</caption>
							<graphic xlink:href="2256-5337-teclo-22-46-00130-gf7.jpg"/>
							<attrib>Source: Authors.</attrib>
						</fig>
					</p>
					<p>Request messages in the node and answer messages in the server are necessary. They are captured by the malicious device that copies the signals. However, the answer messages are not relevant to the proposed test since, when the attack is continuously performed, the request and answer messages are sent again by the malicious node, so the attack fails. Although the response messages from the server could be removed from the copied file, the attack would still fail because the malicious device is unable to obtain the authentication keys sent in response to the forged join request.</p>
				</sec>
				<sec>
					<title>3.2.2 Configuration 2</title>
					<p>Although the data sent by the malicious node is received at the gateway and its identifier suggests that it was sent by the original node, the server rejects the data and they are not considered due to a synchronism failure in the message counter field. Whether the authentic node continues to send messages or not, the counter in the malicious node will not match the number stored in the counter that controls the server.</p>
				</sec>
				<sec>
					<title>3.2.3 Configuration 3</title>
					<p>The success or failure of the attack is verified by comparing the responses of the application to the different messages that were sent. <xref ref-type="fig" rid="f8">Fig. 8</xref>, shows the synchronism of both the malicious node and the authentic node with the counter. In addition, the malicious node sends the message before the authentic node does.</p>
					<p>
						<fig id="f8">
							<label>Fig. 8</label>
							<caption>
								<title>Gateway message reception</title>
							</caption>
							<graphic xlink:href="2256-5337-teclo-22-46-00130-gf8.jpg"/>
							<attrib>Source: Authors.</attrib>
						</fig>
					</p>
					<p>
						<xref ref-type="fig" rid="f9">Fig. 9</xref>, shows that the server only accepts messages from the authentic node. Activation by ABP has a critical vulnerability because the keys are invariable and do not need constant authentication in the network. Therefore, a malicious message, as long as it meets the following requirements, can be accepted by the LoRaWAN network server: -Session keys are the same as those of an accepted end device.</p>
					<p>
						<fig id="f9">
							<label>Fig. 9</label>
							<caption>
								<title>Server reception</title>
							</caption>
							<graphic xlink:href="2256-5337-teclo-22-46-00130-gf9.jpg"/>
							<attrib>Source: Authors.</attrib>
						</fig>
					</p>
					<p>DevAddr field is the same as that of an accepted end device.</p>
					<p>Frame counter value is acceptable <sup>[</sup><xref ref-type="bibr" rid="B16"><sup>16</sup></xref><sup>]</sup>.</p>
					<p>Session keys are the same as those of an accepted end device.</p>
					<p>DevAddr field is the same as that of an accepted end device.</p>
					<p>Frame counter value is acceptable <sup>[</sup><xref ref-type="bibr" rid="B16"><sup>16</sup></xref><sup>]</sup>.</p>
					<p>Although the previous conditions were met, the attack was not successful because the initialization of the nodes was carried out by OTAA. This created new coding keys each time a new session was completed. In addition, the malicious device (HackRF One) could not accurately copy the signal due to interference factors, sampling rate, or message transmission power. As a result, the message format was not valid for the application and rejected despite the fact that it was synchronous, i.e., it matched the value of the counter.</p>
				</sec>
			</sec>
		</sec>
		<sec sec-type="conclusions">
			<title>4. CONCLUSIONS</title>
			<p>The main problem in carrying out an eavesdropping attack in a LoRaWAN configuration is obtaining the required hardware because GNU-Radio configures the hardware and manipulates the signals with relatively effortless simplicity.</p>
			<p>A sequence of frames was captured, visualized, and analyzed during the eavesdropping attack.</p>
			<p>The implemented sniffer captures messages sent from the node to the server, but not the responses from the server to the node when performing replay attacks. As noted, the HackRF One successfully copied all the messages. By capturing the response message from the server to the node, it will therefore decode the subsequent messages sent by the node.</p>
			<p>Said sniffer only takes the message if it is configured with the same SF as the message sent, which hinders the attack on the node if this parameter is set in the message sent.</p>
			<p>Frame counters are a measure proposed by the LoRaWAN specification to avoid replay attacks. However, given the right conditions, this measure could be violated. Even if the malicious node manages to keep sending frames for enough time, a denial of service to the node by the server could occur.</p>
			<p>It was determined that a LoRaWAN implements has implements good measures to avoid replay attacks in OTAA activation. ABP activation countermeasures were not tested since that type of activation was not used.</p>
		</sec>
	</body>
	<back>
		<ack>
			<title>5. ACKNOWLEDGMENTS</title>
			<p>This work was supported by the CIDC (Centro de Investigación y Desarrollo Científico) of Universidad Distrital Francisco José de Caldas, Bogotá, Colombia, and the research group GITUD.</p>
		</ack>
		<ref-list>
			<title>REFERENCES</title>
			<ref id="B1">
				<label>[1]</label>
				<mixed-citation>[1] M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, “A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT),” in <italic>2015 Internet Technologies and Applications (ITA)</italic>, Wrexham, 2015, pp. 219-224. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ITechA.2015.7317398">https://doi.org/10.1109/ITechA.2015.7317398</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Miraz</surname>
							<given-names>M. H.</given-names>
						</name>
						<name>
							<surname>Ali</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Excell</surname>
							<given-names>P. S.</given-names>
						</name>
						<name>
							<surname>Picking</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<source>A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)</source>
					<conf-name>2015 Internet Technologies and Applications (ITA)</conf-name>
					<conf-loc>Wrexham</conf-loc>
					<conf-date>2015</conf-date>
					<fpage>219</fpage>
					<lpage>224</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ITechA.2015.7317398">https://doi.org/10.1109/ITechA.2015.7317398</ext-link>
				</element-citation>
			</ref>
			<ref id="B2">
				<label>[2]</label>
				<mixed-citation>[2] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” <italic>Futur. Gener. Comput. Syst.</italic> vol. 29, no. 7, pp. 1645-1660, Sep. 2013. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.future.2013.01.010">https://doi.org/10.1016/j.future.2013.01.010</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Gubbi</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Buyya</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Marusic</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Palaniswami</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>Internet of Things (IoT): A vision, architectural elements, and future directions</article-title>
					<source>Futur. Gener. Comput. Syst.</source>
					<volume>29</volume>
					<issue>7</issue>
					<fpage>1645</fpage>
					<lpage>1660</lpage>
					<month>09</month>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.future.2013.01.010">https://doi.org/10.1016/j.future.2013.01.010</ext-link>
				</element-citation>
			</ref>
			<ref id="B3">
				<label>[3]</label>
				<mixed-citation>[3] M. Shin, J. Ma, A. Mishra, and W. A. Arbaugh, “Wireless Network Security and Interworking,” <italic>Proc. IEEE</italic>, vol. 94, no. 2, pp. 455-466, Feb. 2006. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/JPROC.2005.862322">https://doi.org/10.1109/JPROC.2005.862322</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Shin</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Ma</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Mishra</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Arbaugh</surname>
							<given-names>W. A.</given-names>
						</name>
					</person-group>
					<article-title>Wireless Network Security and Interworking</article-title>
					<source>Proc. IEEE</source>
					<volume>94</volume>
					<issue>2</issue>
					<fpage>455</fpage>
					<lpage>466</lpage>
					<month>02</month>
					<year>2006</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/JPROC.2005.862322">https://doi.org/10.1109/JPROC.2005.862322</ext-link>
				</element-citation>
			</ref>
			<ref id="B4">
				<label>[4]</label>
				<mixed-citation>[4] J. Botero Valencia, L. Castaño Londoño, and D. Marquez Viloria, “Trends in the Internet of Things,” <italic>TecnoLógicas</italic>, vol. 22, no. 44, pp. I-II, Jan. 2019. https://doi.org/10.22430/22565337.1241</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Botero Valencia</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Castaño Londoño</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Marquez Viloria</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<article-title>Trends in the Internet of Things</article-title>
					<source>TecnoLógicas</source>
					<volume>22</volume>
					<issue>44</issue>
					<fpage>I</fpage>
					<lpage>II</lpage>
					<month>01</month>
					<year>2019</year>
				</element-citation>
			</ref>
			<ref id="B5">
				<label>[5]</label>
				<mixed-citation>[5] K. Mekki, E. Bajic, F. Chaxel, and F. Meyer, “A comparative study of LPWAN technologies for large-scale IoT deployment,” <italic>ICT Express</italic>, vol. 5, no. 1, pp. 1-7, Mar. 2019. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.icte.2017.12.005">https://doi.org/10.1016/j.icte.2017.12.005</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Mekki</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Bajic</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Chaxel</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Meyer</surname>
							<given-names>F.</given-names>
						</name>
					</person-group>
					<article-title>A comparative study of LPWAN technologies for large-scale IoT deployment</article-title>
					<source>ICT Express</source>
					<volume>5</volume>
					<issue>1</issue>
					<fpage>1</fpage>
					<lpage>7</lpage>
					<month>03</month>
					<year>2019</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.icte.2017.12.005">https://doi.org/10.1016/j.icte.2017.12.005</ext-link>
				</element-citation>
			</ref>
			<ref id="B6">
				<label>[6]</label>
				<mixed-citation>[6] B. Singh and B. Kaur, “Comparative study of Internet of Things infrastructure and security,” in <italic>Global Wireless Submit 2016</italic>, Aarhus Denmark, 2016.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Singh</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Kaur</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<source>Comparative study of Internet of Things infrastructure and security</source>
					<conf-name>Global Wireless Submit 2016</conf-name>
					<conf-loc>Aarhus, Denmark</conf-loc>
					<conf-date>2016</conf-date>
				</element-citation>
			</ref>
			<ref id="B7">
				<label>[7]</label>
				<mixed-citation>[7] S. Serna, “Especificación de Perfil Zigbee para Monitoreo y Control de Plantas Industriales,” <italic>TecnoLógicas</italic>, no. 23, pp. 167-185, Dec. 2009. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.22430/22565337.238">https://doi.org/10.22430/22565337.238</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Serna</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<article-title>Especificación de Perfil Zigbee para Monitoreo y Control de Plantas Industriales</article-title>
					<source>TecnoLógicas</source>
					<issue>23</issue>
					<fpage>167</fpage>
					<lpage>185</lpage>
					<month>12</month>
					<year>2009</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.22430/22565337.238">https://doi.org/10.22430/22565337.238</ext-link>
				</element-citation>
			</ref>
			<ref id="B8">
				<label>[8]</label>
				<mixed-citation>[8] Q. Zhou, K. Zheng, L. Hou, J. Xing, and R. Xu, “Design and Implementation of Open LoRa for IoT,” <italic>IEEE Access</italic>, vol. 7, pp. 100649-100657, Jul. 2019. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ACCESS.2019.2930243">https://doi.org/10.1109/ACCESS.2019.2930243</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zhou</surname>
							<given-names>Q.</given-names>
						</name>
						<name>
							<surname>Zheng</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Hou</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Xing</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Xu</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<article-title>Design and Implementation of Open LoRa for IoT</article-title>
					<source>IEEE Access</source>
					<volume>7</volume>
					<fpage>100649</fpage>
					<lpage>100657</lpage>
					<month>07</month>
					<year>2019</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ACCESS.2019.2930243">https://doi.org/10.1109/ACCESS.2019.2930243</ext-link>
				</element-citation>
			</ref>
			<ref id="B9">
				<label>[9]</label>
				<mixed-citation>[9] S. Cruz-Duarte, P. A. Gaona-Garcia, and E. E. Gaona-Garcia, “Cybersecurity In Microgrids,” in <italic>2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW</italic>), Barcelona, 2018. pp. 7-12. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/W-FiCloud.2018.00008">https://doi.org/10.1109/W-FiCloud.2018.00008</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Cruz-Duarte</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Gaona-Garcia</surname>
							<given-names>P. A.</given-names>
						</name>
						<name>
							<surname>Gaona-Garcia</surname>
							<given-names>E. E.</given-names>
						</name>
					</person-group>
					<source>Cybersecurity In Microgrids</source>
					<conf-name>2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)</conf-name>
					<conf-loc>Barcelona</conf-loc>
					<conf-date>2018</conf-date>
					<fpage>7</fpage>
					<lpage>12</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/W-FiCloud.2018.00008">https://doi.org/10.1109/W-FiCloud.2018.00008</ext-link>
				</element-citation>
			</ref>
			<ref id="B10">
				<label>[10]</label>
				<mixed-citation>[10] I. Lee and K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” <italic>Bus. Horiz.</italic>, vol. 58, no. 4, pp. 431-440, Jul. 2015. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.bushor.2015.03.008">https://doi.org/10.1016/j.bushor.2015.03.008</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Lee</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Lee</surname>
							<given-names>K.</given-names>
						</name>
					</person-group>
					<article-title>The Internet of Things (IoT): Applications, investments, and challenges for enterprises</article-title>
					<source>Bus. Horiz.</source>
					<volume>58</volume>
					<issue>4</issue>
					<fpage>431</fpage>
					<lpage>440</lpage>
					<month>07</month>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.bushor.2015.03.008">https://doi.org/10.1016/j.bushor.2015.03.008</ext-link>
				</element-citation>
			</ref>
			<ref id="B11">
				<label>[11]</label>
				<mixed-citation>[11] E. van Es, “LoRaWAN vulnerability analysis:(in) validation of possible vulnerabilities in the LoRaWAN protocol specification.,” Tesis Maestría, Open University of the Netherlands, 2018.</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>van Es</surname>
							<given-names>E.</given-names>
						</name>
					</person-group>
					<source>LoRaWAN vulnerability analysis:(in) validation of possible vulnerabilities in the LoRaWAN protocol specification</source>
					<comment content-type="degree">Tesis Maestría</comment>
					<year>2018</year>
				</element-citation>
			</ref>
			<ref id="B12">
				<label>[12]</label>
				<mixed-citation>[12] E. Aras, G. S. Ramachandran, P. Lawrence, and D. Hughes, “Exploring the Security Vulnerabilities of LoRa,” in <italic>2017 3rd IEEE International Conference on Cybernetics (CYBCONF)</italic>, Exeter, 2017, pp. 1-6. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CYBConf.2017.7985777">https://doi.org/10.1109/CYBConf.2017.7985777</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Aras</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Ramachandran</surname>
							<given-names>G. S.</given-names>
						</name>
						<name>
							<surname>Lawrence</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Hughes</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<source>Exploring the Security Vulnerabilities of LoRa</source>
					<conf-name>2017 3rd IEEE International Conference on Cybernetics (CYBCONF)</conf-name>
					<conf-loc>Exeter</conf-loc>
					<conf-date>2017</conf-date>
					<fpage>1</fpage>
					<lpage>6</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CYBConf.2017.7985777">https://doi.org/10.1109/CYBConf.2017.7985777</ext-link>
				</element-citation>
			</ref>
			<ref id="B13">
				<label>[13]</label>
				<mixed-citation>[13] M. A. Qadeer, A. Iqbal, M. Zahid, and M. R. Siddiqui, “Network Traffic Analysis and Intrusion Detection Using Packet Sniffer,” in <italic>2010 Second International Conference on Communication Software and Networks</italic>, Singapore, 2010, pp. 313-317. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICCSN.2010.104">https://doi.org/10.1109/ICCSN.2010.104</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Qadeer</surname>
							<given-names>M. A.</given-names>
						</name>
						<name>
							<surname>Iqbal</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Zahid</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Siddiqui</surname>
							<given-names>M. R.</given-names>
						</name>
					</person-group>
					<source>Network Traffic Analysis and Intrusion Detection Using Packet Sniffer</source>
					<conf-name>2010 Second International Conference on Communication Software and Networks</conf-name>
					<conf-loc>Singapore</conf-loc>
					<conf-date>2010</conf-date>
					<fpage>313</fpage>
					<lpage>317</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICCSN.2010.104">https://doi.org/10.1109/ICCSN.2010.104</ext-link>
				</element-citation>
			</ref>
			<ref id="B14">
				<label>[14]</label>
				<mixed-citation>[14] LoRa Alliance, <italic>LoRaWAN</italic>
 <sup>
 <italic>TM</italic>
</sup> 
 <italic>Specification Version 1.1</italic>, 2015. [En línea] Disponible en: <ext-link ext-link-type="uri" xlink:href="https://lora-alliance.org/resource-hub/lorawanr-specification-v11">https://lora-alliance.org/resource-hub/lorawanr-specification-v11</ext-link>
				</mixed-citation>
				<element-citation publication-type="software">
					<person-group person-group-type="author">
						<collab>LoRa Alliance</collab>
					</person-group>
					<source>LoRaWAN <sup>TM</sup> Specification Version 1.1</source>
					<year>2015</year>
					<comment>En línea</comment>
					<comment>Disponible en</comment>
					<ext-link ext-link-type="uri" xlink:href="https://lora-alliance.org/resource-hub/lorawanr-specification-v11">https://lora-alliance.org/resource-hub/lorawanr-specification-v11</ext-link>
				</element-citation>
			</ref>
			<ref id="B15">
				<label>[15]</label>
				<mixed-citation>[15] Github, “GitHub - rpp0/gr-lora: GNU Radio blocks for receiving LoRa modulated radio messages using SDR,” <italic>GitHub - rpp0/gr-lora: GNU Radio blocks for receiving LoRa modulated radio messages using SDR</italic>, 2019. [En línea] Disponible en: <ext-link ext-link-type="uri" xlink:href="https://github.com/rpp0/gr-lora">https://github.com/rpp0/gr-lora</ext-link>
				</mixed-citation>
				<element-citation publication-type="software">
					<person-group person-group-type="author">
						<collab>Github</collab>
					</person-group>
					<source>GitHub - rpp0/gr-lora: GNU Radio blocks for receiving LoRa modulated radio messages using SDR,” <italic>GitHub - rpp0/gr-lora: GNU Radio blocks for receiving LoRa modulated radio messages using SDR</italic></source>
					<year>2019</year>
					<comment>En línea</comment>
					<comment>Disponible en</comment>
					<ext-link ext-link-type="uri" xlink:href="https://github.com/rpp0/gr-lora">https://github.com/rpp0/gr-lora</ext-link>
				</element-citation>
			</ref>
			<ref id="B16">
				<label>[16]</label>
				<mixed-citation>[16] X. Yang, “LoRaWAN: Vulnerability Analysis and Practical Exploitation,” Tesis Maestría, Delft University of Technology, 2017. <ext-link ext-link-type="uri" xlink:href="http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e">http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e</ext-link>
				</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>Yang</surname>
							<given-names>X.</given-names>
						</name>
					</person-group>
					<source>LoRaWAN: Vulnerability Analysis and Practical Exploitation</source>
					<comment content-type="degree">Tesis Maestría</comment>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e">http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e</ext-link>
				</element-citation>
			</ref>
		</ref-list>
		<fn-group>
			<fn fn-type="other" id="fn1">
				<label>Cómo citar / How to cite</label>
				<p> A. F. Bravo-Montoya, J. S. Rondón-Sanabria, y E. E. Gaona-García, “Development and Testing of a Real-Time LoRawan Sniffer Based on GNU-Radio”. TecnoLógicas, vol. 22, no. 46, pp. 185-194, 2019. <ext-link ext-link-type="uri" xlink:href="https://doi.org/ 10.22430/22565337.1491">https://doi.org/ 10.22430/22565337.1491</ext-link>
				</p>
			</fn>
		</fn-group>
	</back>
</article>