Skip to content

Hi, @DvdMgr thanks for your response. Could you give me a suggestion? #125

@mouaadh1010

Description

@mouaadh1010
    Hi, @DvdMgr thanks for your response. Could you give me a suggestion? 

What kind of simulator can we use to simulate the full package of security features within LoRaWAN's environment? My research is about LoRaWAN security, and I should simulate a certain security algorithm before directly implementing it in the hardware. I hope that doing the simulation can reduce the potential problem of the hardware itself. Actually, hardware implementation is beyond the scope of my research. I need to prove that my proposed security algorithm is proven in the end-to-end LoRaWAN topology by simulating it.

Or is there anyone who has the experience so that you can share it with me? I'll really appreciate it.

Thanks

Originally posted by @asmanuha in #121 (comment)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions