Hello everyone. I am using the “LoRa E220” library. I managed to get two Ebyte LoRa modules to communicate in fixed mode. Since I will be using the modules to open a gate located at a long distance, I was wondering if there is a need to implement some security thing like a rolling code, or if I am already protected in this way.
If I ever implement something like this, can you help me figure out how to do it? I’m using the library methods e220ttl.sendFixedMessage(); for the transmitter; while the receiver reads the received data like this:
if (e220ttl.available() > 0) {
ResponseContainer rs = e220ttl.receiveMessage();
if (rs.data == "on") {
digitalWrite(relay, HIGH);
} else if (rs.data == "off"){
digitalWrite(relay, LOW);
}
}
Thanks Renzo!
I set it up successfully! There is only one small problem: if the transmitter lora module sends an “on” or “off” string, the transmitter rs.data reads like this: “on%?d05”
however, the strings I receive on the transmitter have strange characters.
However it doesn’t matter, since I finished the project and set up as I told you earlier like this:
I had a similar problem and I think I found the source of the bug.
The bug occurs when using a String type variable for the message. The Sender does not send the last character of the String.
Ex: When sending “101”, the Sender sends “10”, that is, it does not send the last character.
Ex:
Hi,
I re-do all the specified test, and the library work correctly, the problem is born when you don’t set RSSI enabled on all devices, but only in one.
Bye Renzo
Hi Renzo, I apologize for replying late! In fact the problem is the one you mentioned, that is the application of RSSI. Thank you!
I wanted to ask you another thing, is the encryption with the two constants CRYPT_H and CRYPT_L with a maximum value of 255 for each, which are multiplied, AES type?
Also, with FIXED mode, and Encryption, am I sure that no “smart thief” can intercept the sent command, to use it to send it to the receiving station with LoRa? 😛
Hi Morpheus,
The algorithm of encryption is proprietary to EByte, and I think It’s quite impossible to decrypt, but with brute force (if people try all the 255*255 combinations and the correct channel) people can intercept and read the communication.
Bye Renzo
Maintaining a repository (or site or forum) is a lot like tending to a garden - it requires constant care and attention to keep it thriving. If you're a skilled gardener (or coder!) and want to help keep our repository blooming, we'd love to have you on board! We're also looking for talented writers and forum moderators to help us grow our community. Interested in joining our team? Don't hesitate to reach out and let us know how you can contribute!
Are you a fan of electronics or programming? Share your knowledge with others, write a simple tutorial or how to make a great project Contact me: share_your_ideas@mischianti.org
The content displayed on this website is protected under a CC BY-NC-ND license. Visitors are prohibited from using, redistributing, or altering any content from this website for commercial purposes, including generating revenue through advertising. Any unauthorized use is a violation of the license terms and legal action may be taken against individuals or entities found to be in violation.
You must also provide the link to the source.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.