Hi, @DvdMgr thanks for your response. Could you give me a suggestion?
What kind of simulator can we use to simulate the full package of security features within LoRaWAN's environment? My research is about LoRaWAN security, and I should simulate a certain security algorithm before directly implementing it in the hardware. I hope that doing the simulation can reduce the potential problem of the hardware itself. Actually, hardware implementation is beyond the scope of my research. I need to prove that my proposed security algorithm is proven in the end-to-end LoRaWAN topology by simulating it.
Or is there anyone who has the experience so that you can share it with me? I'll really appreciate it.
What kind of simulator can we use to simulate the full package of security features within LoRaWAN's environment? My research is about LoRaWAN security, and I should simulate a certain security algorithm before directly implementing it in the hardware. I hope that doing the simulation can reduce the potential problem of the hardware itself. Actually, hardware implementation is beyond the scope of my research. I need to prove that my proposed security algorithm is proven in the end-to-end LoRaWAN topology by simulating it.
Or is there anyone who has the experience so that you can share it with me? I'll really appreciate it.
Thanks
Originally posted by @asmanuha in https://github.com/signetlabdei/lorawan/issues/121#issuecomment-974269416