New Report Outlines Security Considerations for LPWA Technology

May 8, 2017

Information security analysts, Franklin Heath, have released an independent report that compares and contrasts the security features of five different Low Power Wide Area (LPWA) network technologies for several typical IoT use cases such as Smart Agriculture, Smart Street Lighting, Smoke Detectors, Water Meters and Smart Meters. It assesses the security features of three 3GPP standardised Mobile IoT technologies that operate in licensed spectrum, LTE-M, NB-IoT and EC-GSM-IoT as well as unlicensed spectrum technologies LoRaWAN and Sigfox.

The detailed report, which can be downloaded here, argues that organisations must work out what level of security they need in addition to other considerations such as cost, long battery life and network coverage when considering a LPWA solution, it is still an important element that must be factored into any decision making process. It highlights how IoT security needs are driven largely by privacy and safety concerns and any deployment using LPWA technologies should be subject to a security risk assessment using tools such as the GSMA IoT Security Assessment.

Some important network security factors highlighted in the report that should be considered as part of any such assessment include:

  • Bandwidth, including Maximum Downlink and Uplink Data RatesThis may limit the security features that can be supported by the LPWA network or implemented in the application layer.
  • Daily Downlink and Uplink ThroughputLPWA devices do not typically transmit or receive data all of the time which can impact security features such as over-the-air security updates.
  • Authentication – Device, Subscriber and Network Secure network connectivity requires a number of different parties to authenticate themselves to each other such as the device, the subscriber and the network provider – the technology must protect against the ‘spoofing’ of these parties by malicious actors.
  • Data ConfidentialityEncryption is typically used to keep data safe from being intercepted by an attacker. Trust in this can be increased by establishing end-to-end security at the application layer.
  • Key Provisioning – Cryptographic techniques for authentication, confidentiality and integrity all rely on cryptographic keys being securely shared between parties.
  • Certified Equipment – In many markets there are legal requirement for devices with radio transmission to have approval or certification before being sold. This is an opportunity for security features to be verified.
  • IP NetworkUse of IP can open up the possibility of attack on devices from the internet and IP security features must be considered.

The report concludes that Mobile IoT technologies, such as LTE-M and NB-IoT support the necessary security features to provide adequate security for all of the use case examples. Noting that some of these security features are optional and must be enabled by the network operator.

The report stresses that following security guidelines, such as the GSMA IoT Security Guidelines, can help companies deploying IoT sevices ensure that they are making the right technology choices and are aware of the security implications of their approach.

To download the report go here. Follow these links to find out more about the GSMA’s work on LPWA networks and IoT Security.

Back

On-Demand Video & Presentations: 6th Mobile IoT Summit The 6th Mobile IoT Summit focused on the rapid growth and momentum behind both NB-IoT and LTE-M technologies. Since the beginning of 2017, 43 worldwide Mobile IoT networks have b...

Read more | See all Resources

The GSMA On-Demand Webinar Series 2017-2018 Mobile IoT (licensed spectrum low power wide area) networks are a high-growth area of the IoT and will play an important role in connecting up billions of new devices. Over 40 su...

Read more | See all Resources

On Demand Webinar: Customer Experiences of Live Mobile IoT (LPWA) Networks Mobile Operators around the world have been deploying Mobile IoT rapidly across their networks, with 38 deployments to date. This growth will accelerate in 2018 enabling more bus...

Read more | See all Resources

Mobile IoT Case Study – Greater China Mobile Operators around the world have been rapidly deploying Mobile IoT (LTE-M & NB-IoT) across their networks, with over 40 deployments to date. Mobile IoT is low power wid...

Read more | See all Resources

Video: Smart London – Air Quality Monitoring with IoT Big Data The GSMA is working with the Royal Borough of Greenwich on an air quality initiative utilising mobile, IoT and Big Data technologies, which aims to improve the health prospects a...

Read more | See all Resources

Automotive IoT Security: Countering the Most Common Forms of Attack Over the past several decades, a pattern has emerged in information security: the attackers are winning, and they are winning faster. As the Internet of Things (IoT) evolves, and...

Read more | See all Resources

Smart agriculture proves a natural use of NB-IoT Agriculture is core to Norwegian culture, but the sector faces increasingly serious challenges. Of the 46,620 farms in Norway, by the end of the last decade only 125,270 agricult...

Read more | See all Industry News

Asia-Pacific’s Ongoing Proliferation of Mobile IoT Deployments Cements it Mobile IoT’s growth across Asia-Pacific continues apace, in line with predictions made by PwC and the GSMA that, by 2020, the continent will become the world’s most connected...

Read more | See all Industry News

GSMA Experts to Speak on Mobile IoT Market and Security Assurance at Smart People are becoming increasingly aware of the Internet of Things.  Over the last year it has gone from being a theoretical prospect to many, with little everyday recognition, to...

Read more | See all Industry News

Release of Universal Hallmark for LTE-M Signals Technology’s Maturity As the industry moves to scale the Internet of Things over the next few years, Mobile IoT is set to become the dominant vehicle for cellular delivery.  Of the 3 billion low powe...

Read more | See all Industry News

Automotive IoT Security: Countering the Most Common Forms of Attack Over the past several decades, a pattern has emerged in information security: the attackers are winning, and they are winning faster. As the Internet of Things (IoT) evolves, and...

Read more | See all Industry News

GSMA IoT Security Guidelines named in UK Government’s “Secure by Design Today Margot James MP, Minister for Digital and Creative Industries, launched the UK Government’s “Secure by Design” report to address the security challenges presented by...

Read more | See all Industry News

GSMA IoT at Hannover Messe 2018 April 23, 2018 Mobile IoT networks are designed for Internet of Things (IoT) applications that are low cost, use low data rates, require battery lives measured in years, and often ope...

Read more | See all Connected Living Events

GSMA IoT at LPWA London 2018 May 22, 2018 REGISTER HERE Mobile IoT refers to low power wide area (LPWA) 3GPP standardised secure operator managed IoT networks in licensed spectrum. In particular, LPWA networks ...

Read more | See all Connected Living Events

IoT Security: GSMA Mobile 360 Series – Privacy & May 30, 2018 Exclusive IoT Discount The GSMA Internet of Things Programme is offering an exclusive 15% discount for the Mobile 360 Series – Privacy & Security. To receive the ...

Read more | See all Connected Living Events

Contact GSMA Legal Email Preference Centre Copyright © 2018 GSMA. GSM and the GSM Logo are registered and owned by the GSMA.