If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
<p>Sigfox can be compared to a cellular network, but for mostly battery-powered IoT devices that don't need to transmit much data. While <a href="https://www.etsi.org/deliver/etsi_gs/LTN/001_099/003/01.01.01_60/gs_LTN003v010101p.pdf">some</a> <a href="https://www.sigfox.com/en/sigfox-iot-technology-overview">sparse</a> <a href="https://tools.ietf.org/html/draft-zuniga-lpwan-sigfox-system-description-04">details</a> on Sigfox's architecture and <a href="https://www.sigfox.com/sites/default/files/1701-SIGFOX-White_Paper_Security.pdf">its security</a> have been published and <a href="https://www.disk91.com/2017/technology/sigfox/the-sigfox-radio-protocol/">some basic reverse engineering has been carried out</a>, most of the protocol specifications remain proprietary and closed, so by now, no independent security audit was performed. Advertised use cases of Sigfox include air quality monitoring, weather stations, utilities metering and tracking farm animals. In this talk, I illustrate why these applications are fine, but why one might not want to track a money transporter with Sigfox or base a home alarm system on it.</p>
<p>The Sigfox network is very atypical, with uplink and downlink based on different physical layers.
After a short introduction, I begin the presentation by taking a deep dive into Sigfox's radio protocol with a focus on its Security. Basics of radio technology (SDRs, ultra-narrow band (UNB) modulation, SRD bands) and techniques for analyzing protocols are briefly summarized and the uplink's and downlink's frame structures are presented.</p>
<p>Subsequently, I show how a radio sniffer that has captured Sigfox messages can extract the uplink's and downlink's contents. While the uplink's payload is already contained in plaintext, the downlink is scrambled, but I indicate how the downlink's pseudorandom whitening sequence used for scrambling can be generated or brute-forced by an eavesdropper. Moreover, I outline attacks that could even compromise Sigfox's authenticity checking.</p>
<p>Finally, I provide some suggestions on how to improve Sigfox's security.</p>
<p>The reference implementation of an alternative Sigfox protocol stack "librenard" that was created as part of this work as well as reconstructed protocol specifications detailing the uplink and significant portions of the downlink protocol will be published immediately after this talk.</p>
English: Finished