To be honest that's the perfect lecture I have never watched before. Everything is crystal clear and easy to follow. I studied the book and I have a question that how can we demonstrate the Replay attack as given in the example?
to send a replay attack, you need to copy the raw payload of a device frame on your gateway. Send it later to a the Network Server with APB the end-device registered. If the network server is not protected against replay attack than the user will receive the decrypted data that he didn't send. If so, the replay attack worked.
@@sylvainmontagny thanks for your reply. The network server is always protected like TTN, Actile, etc so how do we know if it is not protected? I have sent a request message to your linkedin, is it possible to carry out my research work under your supervision? I am working on LoRaWAN security and it's my final year of Ph.D. Thanks
Can the LoRaWAN end device be used as a tag for a moving object like a forklift or stationary object like a wheelchair ramp? Can it be safe from environmental harsh conditions like oil, heat, extreme cold, rains and flood? Thank you in advance.
This is an outstanding lecture. Thanks so much!
this is really amazing, as someone wanting to venture more in this i am totally hooked
More to come soon ;-)
Great lecture, organizes the information in the most comprehensive way. Chapeau
Thanks !
was looking for a good explanatory video for my project. Thank you so much for taking the effort to create such a detailed video.
To be honest that's the perfect lecture I have never watched before. Everything is crystal clear and easy to follow. I studied the book and I have a question that how can we demonstrate the Replay attack as given in the example?
to send a replay attack, you need to copy the raw payload of a device frame on your gateway. Send it later to a the Network Server with APB the end-device registered. If the network server is not protected against replay attack than the user will receive the decrypted data that he didn't send. If so, the replay attack worked.
@@sylvainmontagny thanks for your reply. The network server is always protected like TTN, Actile, etc so how do we know if it is not protected? I have sent a request message to your linkedin, is it possible to carry out my research work under your supervision? I am working on LoRaWAN security and it's my final year of Ph.D.
Thanks
Thank you very much for this excellent video and free book!
The best lecture indeed. You enclosed the whole LoRaWAN network into 40 minutes of lecture. Please post some lectures on LoRaWAN security. Thanks
Thanks, really this the best tutorial i haven't seen before
Thanks
Well explained, Bravo et merci beaucoup.
The best one sir, thanks, Please I need LoRaWAN routing protocols as paper or any resources. Thanks
www.univ-smb.fr/lorawan/en/free-book/
Great...just great! Thank you!
Très clair et intéressant, merci !
The best!
Can the LoRaWAN end device be used as a tag for a moving object like a forklift or stationary object like a wheelchair ramp? Can it be safe from environmental harsh conditions like oil, heat, extreme cold, rains and flood? Thank you in advance.
Yes, there are LoRaWAN devices for industrial asset tracking that are rugged with IP67 or IP68 level.
More videos about LoRaWAN : www.udemy.com/course/lora-lorawan-internet-of-things/?referralCode=21DED0F1021F4E261955