<
From version < 1.6 >
edited by Xiaoling
on 2022/05/12 09:09
To version < 6.1 >
edited by Xiaoling
on 2022/05/27 09:03
>
Change comment: Uploaded new attachment "image-20220527090341-5.png", version {1}

Summary

Details

Page properties
Content
... ... @@ -1,4 +1,4 @@
1 - Contents:
1 + **Contents: **
2 2  
3 3  {{toc/}}
4 4  
... ... @@ -6,15 +6,16 @@
6 6  
7 7  A standard LoRaWAN packet via UDP packet forward to LoRaWAN server is AES128 encryption. In this chapter, we will show how this packet looks like in the server and see the possibility to get the content of this packet.
8 8  
9 -[[image:https://wiki.dragino.com/images/thumb/3/36/Unencrypt_Network_3.png/600px-Unencrypt_Network_3.png||height="476" width="600"]]
9 +[[image:image-20220527085838-1.png]]
10 10  
11 11  Unencrypt Network modified from LoRaWAN
12 12  
13 +
13 13  = 2. Analyze the LoRaWAN packet =
14 14  
15 15  If the gateway is connected to LoRaWAN server via UDP packet fordward. We can set the server address to a UDP server to get the LoRaWAN packets.
16 16  
17 -[[image:https://wiki.dragino.com/images/thumb/5/57/None_Encryption_1.png/600px-None_Encryption_1.png||height="259" width="600"]]
18 +[[image:image-20220527090005-2.png]]
18 18  
19 19  UDP Server
20 20  
... ... @@ -21,12 +21,13 @@
21 21  
22 22  We can get one of the LoRaWAN packet and analyze it. See below
23 23  
24 -[[image:https://wiki.dragino.com/images/thumb/b/b9/None_Encryption_2.png/600px-None_Encryption_2.png||height="497" width="600"]]
25 +[[image:image-20220527090050-3.png]]
25 25  
26 26  Analyze the data
27 27  
29 +
28 28  (((
29 -From above screen shot, we can see most of the meaning except this "data":"QHxqASaAygwCXrumS1oFsgRq". This is the AES128 encryption data we mention above, it is base64 format. To decode this data, we need to have the APP Session Key and Network Session Key of this end node. If we have these two keys, we are able to decode this packet by some LoRaWAN decode website like: [[LoRaWAN Decode Website>>url:https://lorawan-packet-decoder-0ta6puiniaut.runkit.sh/]].
31 +From above screen shot, we can see most of the meaning except this** (% style="color:#4F81BD" %)"data":"QHxqASaAygwCXrumS1oFsgRq"**.(%%) This is the AES128 encryption data we mention above, it is base64 format. To decode this data, we need to have the APP Session Key and Network Session Key of this end node. If we have these two keys, we are able to decode this packet by some LoRaWAN decode website like: [[LoRaWAN Decode Website>>url:https://lorawan-packet-decoder-0ta6puiniaut.runkit.sh/]].
30 30  )))
31 31  
32 32  
... ... @@ -34,7 +34,7 @@
34 34  Below is an example, from
35 35  )))
36 36  
37 -[[image:https://wiki.dragino.com/images/thumb/4/4c/None_Encryption_3.png/600px-None_Encryption_3.png||height="388" width="600"]]
39 +[[image:image-20220527090122-4.png]]
38 38  
39 39  Decode the packet
40 40  
image-20220527085838-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +146.1 KB
Content
image-20220527090005-2.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +75.2 KB
Content
image-20220527090050-3.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +107.8 KB
Content
image-20220527090122-4.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +220.7 KB
Content
image-20220527090341-5.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +31.8 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0