Hi, @DvdMgr thanks for your response. Could you give me a suggestion?
What kind of simulator can we use to simulate the full package of security features within LoRaWAN's environment? My research is about LoRaWAN security, and I should simulate a certain security algorithm before directly implementing it in the hardware. I hope that doing the simulation can reduce the potential problem of the hardware itself. Actually, hardware implementation is beyond the scope of my research. I need to prove that my proposed security algorithm is proven in the end-to-end LoRaWAN topology by simulating it.
Or is there anyone who has the experience so that you can share it with me? I'll really appreciate it.
Thanks
Originally posted by @asmanuha in #121 (comment)
What kind of simulator can we use to simulate the full package of security features within LoRaWAN's environment? My research is about LoRaWAN security, and I should simulate a certain security algorithm before directly implementing it in the hardware. I hope that doing the simulation can reduce the potential problem of the hardware itself. Actually, hardware implementation is beyond the scope of my research. I need to prove that my proposed security algorithm is proven in the end-to-end LoRaWAN topology by simulating it.
Or is there anyone who has the experience so that you can share it with me? I'll really appreciate it.
Thanks
Originally posted by @asmanuha in #121 (comment)