To be honest that's the perfect lecture I have never watched before. Everything is crystal clear and easy to follow. I studied the book and I have a question that how can we demonstrate the Replay attack as given in the example?
to send a replay attack, you need to copy the raw payload of a device frame on your gateway. Send it later to a the Network Server with APB the end-device registered. If the network server is not protected against replay attack than the user will receive the decrypted data that he didn't send. If so, the replay attack worked.
@@sylvainmontagny thanks for your reply. The network server is always protected like TTN, Actile, etc so how do we know if it is not protected? I have sent a request message to your linkedin, is it possible to carry out my research work under your supervision? I am working on LoRaWAN security and it's my final year of Ph.D. Thanks
Can the LoRaWAN end device be used as a tag for a moving object like a forklift or stationary object like a wheelchair ramp? Can it be safe from environmental harsh conditions like oil, heat, extreme cold, rains and flood? Thank you in advance.
Hello, can anyone here guide me about how can i use the LoRaSIM simulator and using it to simulate a LoRa Network, nodes, gateways and Network servers. Also, the use of the adaptive data rate on the LoRaSIM.
this is really amazing, as someone wanting to venture more in this i am totally hooked
More to come soon ;-)
This is an outstanding lecture. Thanks so much!
Great lecture, organizes the information in the most comprehensive way. Chapeau
Thanks !
was looking for a good explanatory video for my project. Thank you so much for taking the effort to create such a detailed video.
To be honest that's the perfect lecture I have never watched before. Everything is crystal clear and easy to follow. I studied the book and I have a question that how can we demonstrate the Replay attack as given in the example?
to send a replay attack, you need to copy the raw payload of a device frame on your gateway. Send it later to a the Network Server with APB the end-device registered. If the network server is not protected against replay attack than the user will receive the decrypted data that he didn't send. If so, the replay attack worked.
@@sylvainmontagny thanks for your reply. The network server is always protected like TTN, Actile, etc so how do we know if it is not protected? I have sent a request message to your linkedin, is it possible to carry out my research work under your supervision? I am working on LoRaWAN security and it's my final year of Ph.D.
Thanks
Thank you very much for this excellent video and free book!
The best lecture indeed. You enclosed the whole LoRaWAN network into 40 minutes of lecture. Please post some lectures on LoRaWAN security. Thanks
Thanks, really this the best tutorial i haven't seen before
Thanks
Well explained, Bravo et merci beaucoup.
Can the LoRaWAN end device be used as a tag for a moving object like a forklift or stationary object like a wheelchair ramp? Can it be safe from environmental harsh conditions like oil, heat, extreme cold, rains and flood? Thank you in advance.
Yes, there are LoRaWAN devices for industrial asset tracking that are rugged with IP67 or IP68 level.
Great...just great! Thank you!
The best one sir, thanks, Please I need LoRaWAN routing protocols as paper or any resources. Thanks
www.univ-smb.fr/lorawan/en/free-book/
Très clair et intéressant, merci !
The best!
Hello, can anyone here guide me about how can i use the LoRaSIM simulator and using it to simulate a LoRa Network, nodes, gateways and Network servers. Also, the use of the adaptive data rate on the LoRaSIM.
More videos about LoRaWAN : www.udemy.com/course/lora-lorawan-internet-of-things/?referralCode=21DED0F1021F4E261955