You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, @DvdMgr thanks for your response. Could you give me a suggestion?
What kind of simulator can we use to simulate the full package of security features within LoRaWAN's environment? My research is about LoRaWAN security, and I should simulate a certain security algorithm before directly implementing it in the hardware. I hope that doing the simulation can reduce the potential problem of the hardware itself. Actually, hardware implementation is beyond the scope of my research. I need to prove that my proposed security algorithm is proven in the end-to-end LoRaWAN topology by simulating it.
Or is there anyone who has the experience so that you can share it with me? I'll really appreciate it.
What kind of simulator can we use to simulate the full package of security features within LoRaWAN's environment? My research is about LoRaWAN security, and I should simulate a certain security algorithm before directly implementing it in the hardware. I hope that doing the simulation can reduce the potential problem of the hardware itself. Actually, hardware implementation is beyond the scope of my research. I need to prove that my proposed security algorithm is proven in the end-to-end LoRaWAN topology by simulating it.
Or is there anyone who has the experience so that you can share it with me? I'll really appreciate it.
Thanks
Originally posted by @asmanuha in #121 (comment)
The text was updated successfully, but these errors were encountered: