Changes for page How to send none encryption LoRaWAN Packet
Last modified by Xiaoling on 2023/04/19 17:49
<
edited by Edwin Chen
on 2022/08/23 12:02
on 2022/08/23 12:02
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Edwin1 +XWiki.Xiaoling - Content
-
... ... @@ -15,7 +15,6 @@ 15 15 Unencrypt Network modified from LoRaWAN 16 16 17 17 18 - 19 19 = 2. Analyze the LoRaWAN packet = 20 20 21 21 ... ... @@ -50,23 +50,28 @@ 50 50 Decode the packet 51 51 52 52 53 - 54 54 = 3. Difference between OTAA and ABP mode = 55 55 56 56 57 57 There are two mode for End Node: 58 58 59 -* OTAA: Over the air activation. In this mode, the end node will send a Join Request to server, server will reply with a Join Accept and the end node will parse this Join Accept message to get the Dev Addr / APP Session Key(AppSkey / Network Session Key(NwkSKey). Because the AppSkey and NwkSkey is dynamic, OTAA mode provide more security. 60 -* ABP: Activation by personalization. There is no hand-shake with LoRaWAN server for activition. The end node will use fix Dev Addr / APP Session Key(AppSkey / Network Session Key(NwkSKey) to upload the packet. So the packet can be decode if someone know these fix keys 57 +* (% style="color:blue" %)**OTAA:**(%%) Over the air activation. In this mode, the end node will send a Join Request to server, server will reply with a Join Accept and the end node will parse this Join Accept message to get the Dev Addr / APP Session Key(AppSkey / Network Session Key(NwkSKey). Because the AppSkey and NwkSkey is dynamic, OTAA mode provide more security. 61 61 59 +* (% style="color:blue" %)**ABP:**(%%) Activation by personalization. There is no hand-shake with LoRaWAN server for activition. The end node will use fix Dev Addr / APP Session Key(AppSkey / Network Session Key(NwkSKey) to upload the packet. So the packet can be decode if someone know these fix keys 60 + 61 + 62 + 62 62 = 4. Get and decode the packet = 63 63 64 64 65 65 According to above, it is possible to get the payload from sensor without LoRaWAN server: 66 66 67 -1. Setting the end node to ABP mode 68 -1. Add decode program and add the keys of the sensor. So to get the payload. There is an example for such application, see [[Communication with ABP End Node>>Communicate with ABP End Node without LoRaWAN Network Server --- LG308]] 68 +* Setting the end node to ABP mode 69 69 70 +* Add decode program and add the keys of the sensor. So to get the payload. There is an example for such application, see [[Communication with ABP End Node>>Communicate with ABP End Node without LoRaWAN Network Server --- LG308]]. 71 + 72 + 73 + 70 70 = 5. Use an unencrypt firmware = 71 71 72 72 ... ... @@ -81,19 +81,25 @@ 81 81 Unencrypt packet 82 82 83 83 84 -Note: In some device's firmware . There is a AT Command to Disable Encryption. See below: 88 +(% style="color:red" %)**Note: In some device's firmware . There is a AT Command to Disable Encryption. See below:** 85 85 86 -* AT+DECRYPT=1 The payload is uploaded without encryption 87 -* AT+DECRYPT=0 Encrypt when uploading payload (default) 90 +* (% style="color:blue" %)**AT+DECRYPT=1**(%%) The payload is uploaded without encryption 88 88 92 +* (% style="color:blue" %)**AT+DECRYPT=0 **(%%) Encrypt when uploading payload (default) 89 89 94 + 95 + 90 90 = 6. limitation = 91 91 92 92 93 93 * None standard LoRaWAN protocol, it is not compatible with LoRaWAN server. 100 + 94 94 * No device management / ADR management defined in LoRaWAN protocol 102 + 95 95 * No security. 104 + 96 96 * No Downlink 106 + 97 97 * Only use for ABP 98 98 99 99