Jamming of Lora Phy and Countermeasure: Ningning Hou, Xianjin Xia, Yuanqing Zheng
Jamming of Lora Phy and Countermeasure: Ningning Hou, Xianjin Xia, Yuanqing Zheng
Abstract—LoRaWAN forms a one-hop star topology where design is resilient to a certain type of jamming attacks and
LoRa nodes send data via one-hop up-link transmission to a LoRa intentional interference.
gateway. If the LoRa gateway can be jammed by attackers, the By conducting deep analysis, however, we notice that if
LoRa gateway may not be able to receive any data from any nodes
in the network. Our empirical study shows that although LoRa the jamming chirps are well-aligned with LoRa chirps, LoRa
physical layer (PHY) is robust and resilient by design, it is still gateways cannot extract the LoRa chirps from jamming chirps
vulnerable to synchronized jamming chirps. Potential protection any more. As such, a malicious attacker can send synchronized
solutions (e.g., collision recovery, parallel decoding) may fail chirps at high power to jam LoRa chirps, which leads to
to extract LoRa packets if an attacker transmits synchronized dramatic performance degradation of LoRa communication.
jamming chirps at high power. To protect the LoRa PHY from
such attacks, we propose a new protection method that can We note that existing collision recovery solutions (e.g., FTrack
separate LoRa chirps from jamming chirps by leveraging their [12], mLoRa [14]) cannot resolve collisions caused by syn-
difference in the received signal strength in power domain. We chronized jamming chirps, since the LoRa chirps and the
note that the new protection solution is orthogonal to existing jamming chirps are aligned and thus cannot be separated in the
solutions which leverage the chirp misalignment in time domain time domain. Frequency domain collision recovery solutions
or the frequency disparity in frequency domain. We conduct
experiments with COTS LoRa nodes and software defined radios. (e.g., Choir [13]) cannot help either since attackers can send
The results show that synchronized jamming chirps at high power the jamming chirps at the same frequency of LoRa chirps.
can jam all previous solutions, while our protection solution can To further enhance the LoRa PHY against synchronized
effectively protect LoRa gateways from the jamming attacks. jamming chirps, we propose a new protection method that
separates LoRa chirps from jamming chirps by leveraging their
I. I NTRODUCTION difference in signal strength. We note that the new protection
Low-power wide-area networks such as LoRaWAN are method is orthogonal to existing solutions which leverage
emerging technologies that enable long-range low-power wire- timing information (e.g., chirp boundary misalignment) or
less communication for battery-powered sensor nodes [1]–[4]. frequency information (e.g., frequency disparity). As such, our
A LoRa node is expected to transmit LoRa packets with the protection method can be integrated with existing collision
communication range upto 10 km using AA batteries for ten recovery solutions and complement each other.
years and enables innovative applications [5]–[7] (e.g., smart We implement our protection method and conduct exper-
electricity metering, smart homes, supply chain, and health iments with COTS LoRa nodes as well as software defined
care). radios. The experiment results show that well-synchronized
LoRa adopts chirp spread spectrum (CSS) modulation in jamming chirps at high transmission power can jam all
physical layer (PHY), which is known to be resilient and previous solutions with very high success rates, while our
robust to interference and noise. Benefiting from the long protection method can effectively protect LoRa gateways from
communication range, LoRaWAN forms a one-hop star topol- all known LoRa jamming attacks including synchronized
ogy, where a large number of LoRa nodes can send packets jamming chirps.
via one-hop up-link transmissions to a LoRa gateway, which The key contributions of this paper can be summarized as
greatly simplifies the network protocol design and facilitates follows.
data collection. In such a star topology, however, if a LoRa • We investigate the vulnerability of current LoRaWAN
gateway is jammed by malicious attackers, the LoRa gateway physical layer under jamming attacks. We expose the
may not be able to receive LoRa packets from any nodes in the risk of LoRa gateways under the attack of synchronized
network, leading to single point of failure. Neighbor gateways jamming chirps, which could lead to single point of
could help receive the packets in this case, but those gateways failure in LoRaWAN.
can also be under jamming attacks. • We propose a new collision recovery method as a coun-
We note that wireless jamming has been extensively studied termeasure against the attack of synchronized jamming
in literature [8] and LoRa jamming has also been attract- chirps by leveraging the difference in signal strength of
ing attention in both academia and industry recently. Some jamming chirps and LoRa chirps.
previous works [9]–[11] have demonstrated that it is indeed • We conduct comprehensive experiments with COTS
possible to jam LoRa nodes to some extent by emitting various LoRa nodes as well as software defined radios un-
jamming signals, while other measurement studies [1], [12], der various experiment settings. The experiment results
[13] show that LoRa nodes are inherently resilient and robust demonstrate the effectiveness of our protection method
to interference and can even support parallel transmissions against jamming attacks.
by resolving collisions. To better understand the LoRa de-
modulation under jamming attacks, we conduct experiments II. BACKGROUND AND S YSTEM M ODEL
with COTS LoRa nodes and software defined radios. Our
empirical study indicates that jamming attacks (e.g., random A. LoRa PHY: Chirp Spread Spectrum
interference and jamming chirps) may not necessarily affect LoRa adopts Chirp Spread Spectrum (CSS) modulation
packet receptions at LoRa gateways, meaning that LoRa by in physical layer. In CSS, a chirp signal sweeps through
6\QF 3+<
3UHDPEOH 6)' 3D\ORDG
:RUG +HDGHU
Gateway
way
0.6
30
|FFT|
0.4 20
0.2 10
0 0
-8 -6 -4 -2 0 2 1 64 128 192 256
SINR(dB) FFT bin #
(a) (b) (c)
Fig. 4. Jamming with Gaussian noise. (a) Packet Reception Rate of LoRa node under different SINR. (b) Spectrum of LoRa base chirps under Gaussian
noise attack. (c) FFT after dechirp operation of chirp in red box in (b).
can be jammed using Gaussian noise and evaluate the impact 0.2
Loc1 #1-4 Sync&SFD
0.2
Loc2 #5-8 Hdr&PayL
of Gaussian noise to LoRa communication. To this end, we 0 0
_))7_
_))7_
127MDPPLQJRU'21(MDPPLQJ CFO
%:
Fig. 7. The general workflow of LoRa jammer. Δt Δt
(a) (b)
the packet by extracting synchronization information. After
Fig. 8. CFO affects edge detection: (a)Detected edge vs. real edge of base
that, it can identify and interpret the packet header like a up-chirp in preamble. (b)Extracted SFD down-chirp with edge offset Δt.
normal receiver. If the packet is transmitted by a targeted
node, the jammer will emit synchronized chirps to jam the the resulting FFT peak indicates the value of Δfcf o . We
legitimate packet. Specifically, to launch an effective jamming use Δfcf o to compute the corresponding chirp edge offset
with well-synchronized chirps, the jammer needs to take all 2SF
Δt = BW 2 Δfcf o , which is finally used to infer the correct
time/frequency offsets (i.e., jamming conditions) into account chirp edge from detected edges.
and carefully compensate them before sending jamming chirps As we may detect incorrect chirp boundaries from the
in real time. We present the key steps to generate synchronized received preamble due to CFO, one may wonder how to extract
chirp jamming in the following. the correct preamble chirp and SFD chirp for CFO estimation.
1) Accounting for propagation delay: Basically, the emitted As a matter of fact, we can first perform correlation detection
jamming chirps are required to closely align with the chirps on the received preamble to coarsely detect the boundary
of a legitimate packet when received at a gateway. The timing of chirps with a time offset, as illustrated by red
communication distance between jammer and gateway and dashed lines in Fig. 8. We use the coarsely detected timing
the corresponding propagation delay affects the arrival time to identify SFD chirps. We note that the extracted preamble
of jamming chirps at the gateway. We notice that as LoRa base-chirp and SFD down-chirp have the same offset (i.e.,
typically adopts narrow bandwidths (i.e., ≤ 500 kHz), the Δt) with their real edge timing, as illustrated in Fig. 8. As a
sampling interval of LoRa receiver is relatively large (e.g., > result, the extracted chirps in Eq. (5) for CFO estimation
2 μs). The signals arrived within 2 μs (which corresponds to are actually Rpre (t − Δt) and Rsf d (t − Δt), rather than
a communication distance of 600 m) are aligned to the same the ideal Rpre (t) and Rsf d (t). As the edge time offset (Δt)
PHY sample. In practice, the jammer can emit jamming chirps translate into frequency offset Δfedge for the up-chirp and
within 600 m away from the gateway to mitigate the influence an opposite frequency −Δfedge for the down-chirp, we have
of propagation delay. Rpre (t − Δt) · Rsf d (t − Δt) = Rpre (t) · Rsf d (t). In summary,
2) Compensating carrier frequency offset (CFO): When the above CFO estimation method (i.e., Eq .(5)) still holds
jammer hears the preamble of a legitimate packet, it detects with the time offset in preamble and SFD detection.
chirp boundaries from the preamble and aligns jamming chirps 3) Compensating hardware and software delay: The jam-
to legitimate chirps. Intuitively, the jammer can detect chirp mer also needs to process received signal and react in real
edges by correlating the received preamble that is composed time. It imposes a strict constraint on the processing latency
of successive base chirps with a locally generated base- (termed jamming delay). We use a software defined radio (i.e.,
chirp. However, the detected edges may not correspond to the USRP N210) as hardware and use the open-source GNU Radio
correct chirp edges due to carrier frequency offset between (GR) as software to perform jamming on-line. In particular,
the legitimate node and the jammer. As a result, the frequency we list the main contributors of jamming delay as follows.
offset translates into corresponding time offset for chirp signals
• Data transfer: The delay of data transfers between dif-
[12], [16]. To be specific, let Δfcf o denote the CFO. The
received preamble chirps can be represented as ferent components, e.g., from USRP Rx buffer to data
processing blocks as well as from blocks to USRP Tx
Rpre (t) = h · e−jΔfcf o t · C(t) (3) when emitting jamming chirps.
• Scheduling: The latency of OS (i.e., operating system)
where C(t) denotes the base up-chirp of preamble transmitted and GR scheduling.
by the legitimate node, and h is the channel between the • Signal processing: The latency of signal processing in-
node and the jammer. If we directly correlate Rpre (t) with cluding preamble detection, packet decoding, synchro-
a local base chirp C(t), the detected chirp edge would be nization of jamming chirps, etc.
2SF
Δt = BW 2 Δfcf o away from the real edge, as illustrated in We note that as signal processing is generally performed on
Fig. 8(a). According to our measurements, this edge offset Δt PCs with powerful CPUs, the processing latency is relatively
can be as large as ten samples in practice. As such, a jammer short (e.g., tens of μs on our Intel i5 PC). In comparison,
must compensate the timing offset caused by CFO and align the air time of LoRa packet is of 2 ∼ 3 orders of magnitude
jamming chirps to correct edges. longer. For instance, the transmission time of a typical LoRa
Firstly, a jammer needs to estimate CFO from the received chirp with SF = 8, BW = 250 kHz is about 1 ms (i.e.,
signal. We exploit the SFD that comes after preamble (see 100× longer than signal processing). Theoretically, this would
Fig. 1) for CFO estimation. In particular, a received SFD leave a sufficient amount of time for a jammer to finish signal
chirp can be represented as: processing and generate jamming chirps in real time.
Rsf d (t) = h · e−jΔfcf o t · C −1 (t) (4) On the other hand, we empirically observed that the GR
scheduling and data transfers exhibit time uncertainty in
By multiplying Eq. (3) with Eq. (4), we obtain practice. The latency varies randomly from 100 μs to 10, 000
Rpre (t) · Rsf d (t) = h2 · e−j2Δfcf o t (5) μs in our measurements. We configure the GR scheduler
with a Single-Thread-Scheduler mode (i.e., STS) to reduce
We perform FFT (Fast Fourier Transform) on Eq. (5) and the processing latency and time variation. We also configure
150
'HPRG:LQ 'HPRGXODWLRQUHVXOW
-DPPLQJFKLUS
100
3RZHU
|FFT|
50 /HJLWLPDWHFKLUS
0
))7ELQ 1 64 128 192 256
(a) (b) FFT bin#
(a) (b)
3RZHU
Fig. 10. Jamming power is higher than the power of legitimate packet:
(a)Received signal power of jamming chirp vs. legitimate chirp. (b)FFT
magnitude of demodulated jamming chirp vs. legitimate chirp.
))7ELQ
(c) (d) with the window, as illustrated in Fig. 9(c) and (d). As such, a
Fig. 9. Jamming without synchronization: (a-b) Non-identical jamming
chirps and demodulation result vs. (c-d) Identical jamming chirps and the jammer can emit the same consecutive chirps to defeat existing
demodulation result. When consecutive jamming chirps are identical, the countermeasures without synchronizing to legitimate chirps.
samples from adjacent chirps form a complete chirp in the demodulation However, COTS LoRa radio interleaves the payload data
window which well-aligns with legitimate chirp. to avoid successive identical symbols in the PHY layer.
While we can observe two consecutive chirps with the same
the buffer size of inter-block data transfer to fit the size of initial frequency in practice, we seldom observe more than
LoRa chirps. As a result, the end-to-end jamming latency three identical symbols appearing successively in the payload
becomes rather stable (e.g., 500 μs in our setting), which can of packets transmitted by COTS LoRa nodes. As such, a
be measured and compensated before sending jamming chirps. jammer can emit two consecutive chirps with the same initial
In order to align a jamming chirp with a legitimate chirp, the frequency as jamming chirps.
jammer needs to infer which sample is currently transmitting We note that the consecutive chirp pattern still differs from
in the air (i.e., the front wave of legitimate packet). To this the random chirp pattern of a normal packet payload. Existing
end, the jammer continuously receives samples of legitimate time domain collision recovery schemes can be adapted to
packet using USRP, which buffers the received samples and discern a consecutive jamming attack by detecting chirp’s
reports them when the buffer is full. In practice, the number consecutive patterns. As a result, the consecutive jamming
of reported samples in every buffer and the corresponding approach may not be as effective as the synchronized jamming
timestamp can vary due to the uncertainly in GR scheduling. approach against existing countermeasures. Note that there
To address this problem, the jammer can estimate the current can be other variations of jamming methods. For example,
transmitting sample in the air with the latest received buffer a jammer can transmit consecutive SFD chirps to interfere the
size and its timestamp. By further counting in the processing locking process at a receiver. Similar to identical consecutive
latency, the jammer can determine the time compensation for chirps, this method can be easily detected though.
precise alignment of jamming chirps with legitimate chirps.
V. C OUNTERMEASURE
C. Jamming with identical Consecutive Chirps In the previous section, we reveal that current LoRaWAN
The synchronized jamming approach satisfies all conditions suffers the risk of synchronized jamming attacks. In this sec-
listed in Section IV-A. A jammer can properly choose jamming tion, we present a new countermeasure to protect LoRaWAN
chirps to mimic the payload of a legitimate packet, and employ against synchronized jamming attacks.
synchronized jamming to defeat the existing collision recovery Recall from the jamming conditions in Section IV-A (i.e.,
strategies. However, the synchronized jamming approach re- C-3), in order to successfully jam a LoRa packet, it requires
quires careful calibration and strict timing requirement to align the power of a jamming chirp to be higher than the power of
jamming chirps with legitimate chirps. In the following, we a legitimate chirp in a demodulation window, as illustrated
demonstrate that it is possible to jam in a lightweight manner in Fig. 10(a). Essentially, we can expect a discrepancy of
without strict synchronization (e.g., delay compensation). FFT magnitude between the jamming chirp and the legitimate
If we perform jamming without synchronization, the emitted chirp after demodulation, as shown in Fig. 10(b). This mo-
jamming chirps are likely to misalign with chirps of legitimate tivates us to differentiate a legitimate chirp from a jamming
packet. Suppose a gateway uses a time domain collision chirp by checking their received signal strength in power do-
recovery scheme to protect legitimate packets from jamming main, which complement the conventional collision recovery
attacks. Let us consider a demodulation window that is aligned schemes examining time and frequency domain.
with a legitimate chirp but not jamming chirps. As illustrated The received signal strength (i.e., RSS) of LoRa packet can
in Fig. 9(a), since the demodulation window spans across be affected by many factors (e.g., transmit power, communi-
two adjacent jamming chirps, jamming signals within this cation distance, receiver gain, etc.), but most of those factors
demodulation window would experience a sudden change in are generally invariant during the transmission of a packet. For
frequency at chirp boundary. As a result, after demodulation, instance, the transmit power of a LoRa node can be adapted
there will be two FFT spikes at different FFT bins (Fig. 9(b)). for each packet transmission, but will remain the same during
However, if the two adjacent jamming chirps are the same, the packet transmission. Besides, in our target scenarios, LoRa
their frequency would experience no sudden change at the nodes generally remain stationary or move at a low speed.
jamming chirp boundary (see Fig. 9(c)). As a result, both More importantly, since the LoRa PHY (i.e., CSS) does not
the jamming chirp and the legitimate chirp exhibit frequency modulate the amplitude of LoRa chirps, the power level of
continuity within the demodulation window, meaning that the LoRa chirps from the same packet would remain pretty stable
power of consecutive jamming chirps will concentrate in the and share high similarity. In addition, as a selective jammer
demodulation window, as if one jamming chirp is well-aligned starts jamming after interpreting the header of a legitimate
P
packet, it leaves the packet preamble intact. As such, a receiver
(i.e., gateway) can measure the RSS from the preamble of a -DPPHU
/HJLWLPDWH7[
legitimate packet and use the measured RSS to help extract *DWHZD\
P
Finally, we present a RSS-based LoRa decoder as a coun-
termeasure to the synchronized jamming attack. The decoding
process generally works as follows. A receiver first detects
the preamble of LoRa packet. In addition to extracting symbol
timing (i.e., chirp edges) from preamble as in a standard LoRa (a) Indoor experiment map.
9
decoder, we also measure the RSS of preamble chirps. We
then employ the same method of a standard decoder to locate Jammer
100m
Legitimate Tx
and demodulate symbol chirps in the payload. In each de-
205m
Gateway
Throughput (bit/s)
Throughput (bit/s)
0.8
50 50
0.6 0.6 40
40
30 0.4 30
0.4
20 20
0.2 0.2
10 10
0 0 0 0
5 10 15 20 25 30 Low Medium High Low Medium High
5 10 15 20 25 30
Transmit power of Jammer(dBm) Transmit power of Jammer(dBm) SINR SINR
60
0.8 0.8
Victim Victim
50
Protege Protege
0.6 40 0.6 0.6
setting as in subsection VI-B1. Fig. 13 presents the results. respectively, even higher than that of victim (77%) using
The average PRR and throughput of protege is higher than standard LoRa demodulation. In high SINR scenario, Choir
70% across all transmission power of jammer. In comparison and FTrack still have very high SER and low throughput, while
with Fig. 12, the overall PRR and throughput of protege are protege and victim have almost 0 SER and 100% throughput.
much higher than those of victim, especially when jamming This experiment demonstrates that our RSS-assisted counter-
power is higher than 15 dBm. The throughput of protege measure outperforms all existing countermeasures.
is 20× higher than that of victim when jamming power is
25 dBm, and 23× when jamming power is 30 dBm. This C. Impact of LoRa Configuration
is because when transmission power is higher than 15 dBm,
the SINR at receiver is low (−10 ∼ −5 dB). In this case, In this subsection, we examine the impact of LoRa packet
the power of legitimate chirps is weaker than that of jamming configuration on the performance of jamming attack and
chirps, leading to incorrect demodulation results of victim. our countermeasure strategy. We adopt the same experiment
In contrast, our countermeasure can leverage the difference settings as in Section VI-B. Due to page limit, we only present
in received signal strength and separate the legitimate chirps the results of high jamming power (≥ 20 dBm).
from the jamming chirps. The experiment results indicate that We first study the impact of LoRa spreading factor (SF).
our countermeasure can protect the LoRa gateway against such In this experiment, we fix the bandwidth to 250 kHz and
synchronized jamming attacks. vary SF from 7 to 11. We compare the PHY layer symbol
3) Comparison with Existing Countermeasures: In the fol- error rates of standard demodulation method (i.e., victim) and
lowing, we compare victim and protege with two typical our countermeasure strategy (i.e., protege) in Fig. 15(a). As
collision recovery and parallel decoding methods, i.e., FTrack expected, the SER of victim stays at high level (e.g., > 90%)
and Choir. We compare these four methods in low (−10 ∼ for all SFs due to the high jamming power. In contrast, the
−5 dB), medium (−5 ∼ 5 dB), and high (5 ∼ 10 dB) SINR protege can decode legitimate packets with SER lower than
scenarios. Each scenario includes over 120 measurements. 10% when SF = 7 ∼ 9. We observe that the SER of protege
We plot the SER and throughput in Fig. 14. We observe increases dramatically to higher than 60% as SF increases to
that victim, Choir and protege have lower SER as SINR 10 and 11. This is because the frequency gap between LoRa
becomes higher. However, FTrack has over 72% SER in symbols becomes narrower as SF increases. As such, a larger
all scenarios. This is because FTrack distinguishes colliding SF will generally make the demodulation more vulnerable to
chirps by using frequency tracks caused by time misalignment jamming attacks.
of two chirps. However, jammer in this paper synchronizes We next evaluate the SERs of victim and protege in various
jamming chirps with legitimate chirps, making it hard for bandwidth (BW) of LoRa packet. We set SF = 8 and
collision recovery method which uses timing information to change BW from 125 kHz to 500 kHz in the experiment.
separate. Since Choir disentangles colliding chirps by leverag- In Fig. 15(b), we see that as compared to the high SERs of
ing the disparity in frequency domain, higher signal strength standard demodulation method (i.e., victim), our countermea-
benefits its performance. We can also see that protege has sure strategy can correctly demodulate legitimate chirps with
best performance in terms of SER and throughput in all SINR SER < 20% when BW ≥ 250 kHz. This is because wider
scenarios. Specifically, in low SINR scenario, our countermea- bandwidth corresponds to larger frequency gap between LoRa
sure (i.e., protege) only has 26% SER in low SINR scenario symbols. As such, a wider bandwidth will generally make the
while FTrack and Choir have SER of 96.38% and 98.7% demodulation more robust to jamming attacks.
1
Victim
1
Victim
support wide area network connection for IoT devices. Prior
Protege Protege
efforts [1], [23]–[27] are devoted to the measurement study
Symbol Error Rate