esib_iot_challenge
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
esib_iot_challenge [2017/05/17 22:35] – [3. Devices] samer | esib_iot_challenge [2017/05/17 22:45] – [7. The Radio Challenge] samer | ||
---|---|---|---|
Line 119: | Line 119: | ||
* What are the possible strengths and weaknesses in terms of security of MQTT? | * What are the possible strengths and weaknesses in terms of security of MQTT? | ||
* What are the different types of topics used by the backend? Explain. | * What are the different types of topics used by the backend? Explain. | ||
- | * Explain the different fields in a captured MQTT message received from you device. | + | * Explain the different fields in a captured MQTT message received from you device. |
</ | </ | ||
+ | |||
+ | <WRAP left round tip 100%> | ||
+ | The payload received by the MQTT client is decrypted but encoded in Base64. You should decode it to get the original message. | ||
+ | </ | ||
+ | |||
===== -. The End-to-End Challenge ===== | ===== -. The End-to-End Challenge ===== | ||
Line 127: | Line 132: | ||
===== -. The Radio Challenge ===== | ===== -. The Radio Challenge ===== | ||
- | < | ||
- | // LMIC_disableChannel(1); | ||
- | // LMIC_disableChannel(2); | ||
- | // LMIC_disableChannel(3); | ||
- | // LMIC_disableChannel(4); | ||
- | // LMIC_disableChannel(5); | ||
- | // LMIC_disableChannel(6); | ||
- | // LMIC_disableChannel(7); | ||
- | // LMIC_disableChannel(8); | ||
- | // LMIC_setDrTxpow(DR_SF10, | ||
- | </ | ||
- | |||
- | < | ||
- | { | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | }], | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | " | ||
- | }, | ||
- | " | ||
- | } | ||
- | } | ||
- | </ |
esib_iot_challenge.txt · Last modified: 2021/08/28 09:53 by samer