Show simple item record

dc.contributor.author
Leu, Patrick
dc.contributor.author
Puddu, Ivan
dc.contributor.author
Ranganathan, Aanjhan
dc.contributor.author
Capkun, Srdjan
dc.date.accessioned
2022-03-10T09:51:32Z
dc.date.available
2018-08-10T08:45:49Z
dc.date.available
2018-08-10T15:34:51Z
dc.date.available
2019-11-19T11:58:46Z
dc.date.available
2019-11-20T09:42:19Z
dc.date.available
2022-03-10T09:51:32Z
dc.date.issued
2018-06
dc.identifier.isbn
978-1-4503-5731-9
en_US
dc.identifier.other
10.1145/3212480.3212508
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/281724
dc.identifier.doi
10.3929/ethz-b-000281724
dc.description.abstract
Low-power wide area networks (LPWANs), such as LoRa, are fast emerging as the preferred networking technology for large-scale Internet of Things deployments (e.g., smart cities). Due to long communication range and ultra low power consumption, LPWAN-enabled sensors are today being deployed in a variety of application scenarios where sensitive information is wirelessly transmitted. In this work, we study the privacy guarantees of LPWANs, in particular LoRa. We show that, although the event-based duty cycling of radio communication, i.e., transmission of radio signals only when an event occurs, saves power, it inherently leaks information. This information leakage is independent of the implemented crypto primitives. We identify two types of information leakage and show that it is hard to completely prevent leakage without incurring significant additional communication and computation costs.
en_US
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
Association for Computing Machinery
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.title
I send, therefore I leak: Information leakage in low-power wide area networks
en_US
dc.type
Conference Paper
dc.rights.license
In Copyright - Non-Commercial Use Permitted
ethz.book.title
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
en_US
ethz.pages.start
23
en_US
ethz.pages.end
33
en_US
ethz.version.deposit
acceptedVersion
en_US
ethz.event
11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
en_US
ethz.event.location
Stockholm, Sweden
en_US
ethz.event.date
June 18-20, 2018
en_US
ethz.grant
Cross-Layer Design of Securing Positioning
en_US
ethz.identifier.wos
ethz.identifier.scopus
ethz.publication.place
New York, NY
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03755 - Capkun, Srdan / Capkun, Srdan
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03755 - Capkun, Srdan / Capkun, Srdan
ethz.grant.agreementno
726227
ethz.grant.fundername
EC
ethz.grant.funderDoi
10.13039/501100000780
ethz.grant.program
H2020
ethz.date.deposited
2018-08-10T08:45:52Z
ethz.source
SCOPUS
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2018-08-10T15:34:55Z
ethz.rosetta.lastUpdated
2024-02-02T16:30:16Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=I%20send,%20therefore%20I%20leak:%20Information%20leakage%20in%20low-power%20wide%20area%20networks&rft.date=2018-06&rft.spage=23&rft.epage=33&rft.au=Leu,%20Patrick&Puddu,%20Ivan&Ranganathan,%20Aanjhan&Capkun,%20Srdjan&rft.isbn=978-1-4503-5731-9&rft.genre=proceeding&rft_id=info:doi/10.1145/3212480.3212508&rft.btitle=Proceedings%20of%20the%2011th%20ACM%20Conference%20on%20Security%20&%20Privacy%20in%20Wireless%20and%20Mobile%20Networks
 Search print copy at ETH Library

Files in this item

Thumbnail

Publication type

Show simple item record