Security Vulnerabilities in LoRaWAN