You are on page 1of 3

Low-power Wide Area Networking Protocol Network

Attack
Cristiana Andrei, Irina Bradu, Sebastian-Ion Nae

Low-power Wide Area Networking Protocol Network annotated database and consists of 3 types of record sets. The
(LoRaWAN) networks could be vulnerable to attacks that could first record set which has records that begin with the letter “n”
result in falsified information.Another device could send comes from 50 subjects who do not have documented atrial
malicious data to the main gateway, thus compromising the fibrillation, either during the period from which the records
relevance of the database’s entries.This paper aims to showcase a were excerpted or at any other time. The length of these
simulation of a man in the middle attack in a network of records is 30 minutes.
IoT(Internet of things) devices. This project uses a LoRa-like
architecture and uses bluetooth beacons represented by IoT In order to accurately detect R peaks in the ECG signal
devices that send data that is intercepted by a gateway, thus some preprocessing steps are necessary. In this way, false or
lowering the energy consumption of both implicated devices. missed peaks that appear due to noise or artifacts are corrected.
Keywords—IoT; Embedded Systems; Man-in-the-Middle; Also, ectopic or supraventricular beats have to be removed. We
LoRaWAN; Cyber Attack. have used an automated preprocessing technique - the “20%
filter”, in which RR intervals differing more than 20% of the
previous interval are replaced by the average value of the 5
I. INTRODUCTION (HEADING 1) preceding and 5 following intervals.
Man-in-the-middle attacks (MITM)[23][25] are a common
type of cybersecurity attack that allows attackers to eavesdrop TABLE I. TABLE STYLES
on the communication between two targets. The purpose of this Test set (Table Column Head)
paper is to illustrate a simulation of a MITM attack in a Learning set Table column Subhea
Subhead
LoRaWAN[17][18] network. In IoT[15][21][22] LoRaWAN MITM subhead d
attack, the hacker needs to gain access to an unsecured non-PAF recordings PAF
LoraWAN network. recordings
Pre-PAF areas Non-PAF
Once inside the network, the third party can emit malicious areas
data that will be intercepted by the gateway and introduced in 99 50 50 198
the database
The SDANN indicator is determined using the formula:
The data is encoded in the name of the device and decoded
afterwards by the gateway. The possibility of having redundant
data in case of having a large number of gateways and ms 
endpoints is eliminated by the gateway itself that checks the
database entries before updating or inserting an entry.
This model is inspired by the LoRa Network where is the mean of RR intervals in “i”-th 5-minute
Architecture[17][18] , which uses the LoraWAN communication window, is the mean of all means of RR intervals in all 5-
protocol, and The Things Network, containing multiple minute windows, and N is the number of analysis windows.
endpoints, gateways and a server for transmitting information The LF/HF ratio or Sympathovagal balance Index (SVI) (2)
in a fast and low cost way between devices.
is the ratio between the low frequency (0.04 Hz-0.15 Hz) and
high frequency (0.15 Hz-0.4 Hz) total power components of
the RR time series. They are obtained by applying the Fourier
II. DATABASE AND METHODS Transform to the ECG signal and this was done using the
HRV analysis software available on physionet.org.
A. Database (Heading 2)
The database used for this study was PAF Prediction
Challenge Database 2001 from Physionet.org portal [24],  
mainly its long-term version [25]. The facilities offered by this
important data base of ECG recordings are presented in [26],
[5]. Each record contains two simultaneously recorded Holter The second analysis is based on a newer signal processing
ECG signals, V1 and II leads, digitized at 128 Hz with 12-bit method named morphologic variability (MV) [18], which
resolution over a 20 mV range. This is an automatically highlights the underlying physiological activity of the heart.
First, as a preprocessing stage, this method uses dynamic time- A t-test for the parameters of HRV and MV, for the “n”
warping technique (DTW) which is mostly used in voice recording set (characterized by a normal ECG signal) and for
pattern recognition [28]. The need for DTW of ECG signal the „p” set (with PAF), was performed. At this stage we
comes from the fact that a reliable algorithm has to compute determined confidence intervals for the mean value, for a
the energy changes between consecutive beats, not only confidence level of 99% and p=0,01.
differences in amplitude or time axis. The t-test results given in Table II show that both „n” set
The used algorithm aligns the current QRS complex to the and „p” set do not contain data significantly different from the
previous two and the next two complexes, then determines the reference value (mean value). Moreover, for a value p=0,01
difference between the lengths of each consecutive QRS lower and upper confidence level are specific for each type of
complex in order to obtain the morphological difference (MD) HRV or MV indicator, both for normal and pre-PAF ECG
time series: signals. The „t” test set from Physionet contains 142 “normal”
recordings (without PAF episodes) and 56 recordings with
PAF.
MD = | QRSi2  QRSi1 | + | QRSi 1  QRSi | (3)
IV. CONCLUSIONS
where QRSi is the length of the QRS complex of the i beat.
In this way, the technique described here measures changes In this study we have emphasized the synergistic
in morphology resulting from both amplitude and timing combination of two different automatic prediction methods of
differences between two beats and transforms the original PAF, one of them usually used – HRV analysis – and the other
– a new technique for surface ECG analysis: morphologic
ECG signal from a sequence of beats to a sequence of energy
variability (MV) of QRS complexes. Some efficient
differences. This new signal, comprising pairwise, time- preprocessing methods, of which the dynamic time-warping
aligned energy differences between beats, is then smoothed (DTW) has a major role, assure better results than those
using a median filter of length 8. obtained with HRV alone. The experiments emphasized the
main and new outcome of our study, that MV is a reliable
electrocardiographic risk stratification measure to predict atrial
1. Template sub-section (Heading 2)
fibrillation onset. In this respect, the experiments demonstrated
that low levels of the MV_LF/HF measure are significantly
2. Another Template sub-section (Heading 2) associated with a higher risk of atrial fibrillation.
Also, the experimental work revealed a better accuracy
III. RESULTS provided by MV in comparison with HRV method. When
For the training set, as well as for the test set, we have used using both methods and a decision support module, the
first the HRV software and computed two indicators: accuracy of prediction is the best, of about 90%, comparable
HRV_SDANN and HRV_LF/HF. Then, by means of an with the best results in the literature, which were obtained by
algorithm implemented in Matlab 2010, we computed the using special recordings and more complex and time
morphologic distance between QRS complexes, we obtained consuming methods. Our method has the main advantage that
morphologic variability (MV) and computed similar uses usual Holter recordings and the analysis is a short-term
parameters: MV_SDANN and MV_LF/HF. one (on a 5-minute window from 30 minutes total interval).

REFERENCES
Unless there are six authors or more give all authors’ names;
do not use “et al.”.
Capitalize only the first word in a paper title, except for
proper nouns and element symbols. For papers
published in translation journals, please give the
English citation first, followed by the original foreign-
language citation. Papers that have not been
published, even if they have been submitted for
publication, should be cited as “unpublished”. Papers
that have been accepted for publication should be
cited as “in press”.
Fig. 1. Example of a figure caption. (figure caption)
[1] Ng, Pai Chet, James She, and Rong Ran. “A reliable smart
interaction with physical things attached with ble beacons” IEEE
The sampling frequency of 128 Hz was enough for the Internet of Things Journal, 7(4), 3650-3662.
purposes of the study, as we mainly computed RR and QRS [2] Zhuang, Yuan et al.,“Smartphone-based indoor localization with
intervals, not the exact morphology of the ECG signal. Also, as bluetooth low energy beacons”, in Sensors. 16.6 (2016): 596
we studied a prediction method of the AF onset, not an analysis [3] Brown, Ethan, Web development with node and express:
technique of PAF signal, the small 2-5 minutes episodes of AF leveraging the JavaScript stack, O'Reilly Media, 2019.
[4] Tilkov, Stefan and Steve Vinoski, “Node.js : Using JavaScript to
have no relevance for our study and the obtained results. build high-performance network programs.” IEEE Internet
Computing 14.6(2010): 80-83.
[5] Upton, Eben and Gareth Halfacree, “Raspberry Pi user guide”. [17] Bor, Martin, John Edward Vidler, and Utz Roedig. "LoRa for the
John Wiley & Sons, 2014 Internet of Things." (2016): 361-366.
[6] Richardson, Matt, and Shawn Wallace. “Getting started with [18] Augustin, Aloÿs, et al. "A study of LoRa: Long range & low power
raspberry PI”. O’Reilly Media Inc., 2012 networks for the internet of things." Sensors 16.9 (2016): 1466.
[7] Wohlgethan, Eric “SupportingWeb Development Decisions by [19] Cherny, Boris. “Programming TypeScript: making your JavaScript
Comparing Three Major JavaScript Frameworks: Angular, React applications scale.” O'Reilly Media, 2019.
and Vue.js” Diss. Hochschule für Angewandte Wissenschaften [20] Vane, Vilic. “TypeScript design patterns.”  Packt Publishing Ltd,
Hamburg, 2018 2016.
[8] Passaglia, Andrea “Vue.js 2 Cookbook”, Packt Publishing Ltd, [21] Quadri, Syed Ali Imran, and P. Sathish. "IoT based home
2017 automation and surveillance system." 2017 International
[9] Levy, Amit, et al. “The tock embedded operating system”, Conference on Intelligent Computing and Control Systems
Proceedings of the 15th ACM Conference on Embedded Network (ICICCS). IEEE, 2017.
Sensor Systems, 2017 [22] Dow, Colin. “Internet of things programming projects: build
[10] Farrow, Rik “Operating Systems” modern IoT solutions with the Raspberry Pi 3 and Python.” Packt
[11] Klabnik, Steve, and Carol Nichols. “The Rust Programming Publishing Ltd, 2018.
Language (Covers Rust 2018)”, No Strach Press., 2019 [23] Nayak, G.N. and Samaddar, S.G., 2010, July. Different flavours of
[12] Takano, Keisuke, Tetsuya Oda, and Masaki Kohata. “Design of a man-in-the-middle attack, consequences and feasible solutions. In
DSL for converting rust programming language into RTL”, 2010 3rd International Conference on Computer Science and
International Conference on Emerging Internetworking, Data & Information Technology (Vol. 5, pp. 491-495). IEEE.
Web Technologies, Springer, Charm, 2020 [24] Callegati, F., Cerroni, W. and Ramilli, M., 2009. Man-in-the-
[13] Chodorow, Kristina. “MongoDB: the definitive guide: powerful Middle Attack to the HTTPS Protocol. IEEE Security & Privacy,
and scalable data storage”, O’Reilly Media, Inc., 2013 7(1), pp.78-81.
[14] Zhao, Gansen, et al. “Modeling MongoDB with relational model”, [25] Bhushan, B., Sahoo, G. and Rai, A.K., 2017, September. Man-in-
2013 Fourth International Conference on Emerging Intelligent the-middle attack in wireless and computer networking—A
Data and Web Technologies, IEEE, 2013 review. In 2017 3rd International Conference on Advances in
[15] Severin, Teona, Ioana Culic, and Alexandru Radovici. "Enabling Computing, Communication & Automation (ICACCA)(Fall) (pp.
High-Level Programming Languages on IoT Devices." 2020 19th 1-6). IEEE.
RoEduNet Conference: Networking in Education and Research
(RoEduNet). IEEE, 2020.
[16] Vochescu, Alexandru, Ioana Culic, and Alexandru Radovici.
"Multi-Layer Security Framework for IoT Devices." 2020 19th
RoEduNet Conference: Networking in Education and Research
THE PAPER MUST BE MINIMUM PAGES IN LENGTH
for complex project, simple project 4 pages.
(RoEduNet). IEEE, 2020.
Minimum 10 articles.

Project Proposal
Scientific description
In this section the team will detail the scientific context, the scope and objectives, the approach to these objectives, and the
required material and human resources.

The scientific motivation of the project theme will be justified by delimiting the approached issue in the current scientific context.
The following two aspects will be highlighted: (1) the importance of the issue from a scientific, technological, socio-economic or
cultural point of view, the difficulty elements of the issue, the limitations of current approaches, by analysing the current state of
knowledge of the project’s theme; (2) the elements of originality and innovation that the proposed project brings to the domain,
related to the current state of knowledge.
Project Scope and Objectives
- Presentation of the project scope, describing explicitly the demonstration model (product, technology, method, system or
service) to be developed and tested / validated;
- Point out the degree of novelty and relevance of the preliminary (already available) results related to the project in
relation to national and international state of the art ;
- Presentation of project objectives, their correlation with the outcome of the project, arguing the feasibility of the project;
The approach of the project at the principle level will be presented by highlighing the following three aspects: (1) the
concrete objectives of the project; (2) the proposed work strategy, including investigation methods and tools; (3) a work
plan, staggered in time, which will describe the organisation of the project, in relation to the proposed objectives.
Presentation of the concept of technology / product or existing model which constitutes the starting point of the
project
- Presentation of preliminary results (e.g. theoretical developments, numerical simulations, experimental results)
available prior the project application, with explicit indication of publications, patents and research projects that led to
the basic concept of the project;

You might also like