INCiTiS-FOOD
ROLORAN
Low-power wide area networks (LPWANs) like LoRaWAN, operated by amateurs and enthusiasts, are widespread due to their easy accessibility. This makes these networks attractive for Internet of Things (IoT) applications in business and government.
In its first phase, from 2021 to the end of 2024, the project investigated selected scenarios for the application of LoRa-based communication and provided technical contributions to increasing the resilience of the corresponding infrastructures.
This included:
- Systematic measurement and analysis of the radio range of LoRaWAN devices in urban, suburban and rural outdoor areas as well as in the context of indoor SmartOffices.
- Determination of the susceptibility of transmissions to interference from sources of interference in three selected interference scenarios.
- Localization of LoRa transmitters using “Angle of Arrival” determination.
- Investigation of open-source implementations for gateways, transmitters and backend software with the aim of further improving robustness for long-term continuous operation.
- Security analysis of the design and widespread implementations of LoRaWAN protocols using static and dynamic analysis tools.
- Testing of various application scenarios in cooperation with project partners:
- Property management with the Austrian Armed Forces.
- Early detection of flash floods in cooperation with the district of Bad Kissingen.
- Crisis communication with the municipality of Neuhaus, Carinthia, Austria.
Since LoRaWAN made a promising impression in the first project phase, both theoretically and practically, the following topics will be explored in greater depth in the second project phase from 2025 to the end of 2026:
- Development of detection methods for LoRaWAN-specific attacks and penetration tools for investigating existing LoRaWANs.
- Improvement of the localization approach through supplementary methods for detecting jamming transmitters.
- Providing a guide to building and operating a secure LoRaWAN.
- Further development of existing application scenarios (security studies of existing infrastructures, expansion of systems [new sensors, improved evaluation, revised in-house developments]).