Skip to content
Carlos Alatorre edited this page Jun 19, 2023 · 7 revisions

How does LoRaWAN work?

An end-node device -like a sensor— sends encrypted information transmitted via LoRa radio. A gateway receives the data and forwards it into another network (such as Ethernet) to a network server. The network server delivers the message to the correct end application.

Does the Lorawan network replace Wi-Fi?

No. It uses your internet connection (Wi-Fi or Ethernet) to deliver information sent by devices, like GSP trackers or environmental sensors. That means you can't connect your smartphone or computer to the hotspot. It only works with devices that use LoRaWAN.

Is LoRaWAN free of charge?

LoRaWAN uses unlicensed frequencies and no subscription is required from a telecommunication operator, so it is considered free— to an extent, until after putting out the infrastructures for application.

What is a LoRaWAN node and a LoRaWAN gateway?

A LoRaWAN node is a device that sends encrypted data to a gateway. It can be a sensor or other smart device. A LoRaWAN gateway is the device that receives data sent by end-node devices, processes it and forwards it to a network server.

How can I troubleshoot common issues when using Beelan-LoRaWAN?

If you encounter issues while using Beelan-LoRaWAN, try the following troubleshooting steps: Ensure the hardware connections are correct, and the devices are powered properly. Verify that the correct firmware or library versions are being used. Check if there are any known issues or compatibility problems with specific hardware or firmware versions. Review the error messages or debug output for clues about the issue. Consult the repository's documentation, FAQs, or community forums for known solutions or similar issues faced by other users.

How can I implement secure communication using Beelan-LoRaWAN?

To ensure secure communication with Beelan-LoRaWAN, consider the following practices:

  • Use strong and unique security keys for device authentication and data encryption.
  • Implement appropriate cryptographic algorithms and protocols supported by LoRaWAN.
  • Enable and configure additional security features provided by the LoRaWAN network server, such as frame counters and message integrity checks.
  • Regularly update firmware and security keys to mitigate potential vulnerabilities.
  • Follow best practices and guidelines provided by Beelan-LoRaWAN and the LoRaWAN network server you are using.

Are there any differences between the Activation-by-Personalization (ABP) and Over-the-Air-Activation (OTAA) methods in terms of security?

The backend interfaces involve control and data signaling among Network Servers, Join Servers and Application Servers. HTTPS and VPN technologies are recommended for securing the communication among these critical infrastructure elements, in much the same way as is done in any other telecom systems.