I’m actually working on a device using a NFC chip from ST. Unfortunately, this chip is not using the ISO-14443 norms but the less usual ISO-15693 one. As a consequence the NFC reader I had were not compatible with this norms. I found a solution (there are not a lot) in Amazon to covert this need. The Fongwah S9 NFC Reader. I made this post to share my test experience of this device.
Precision: this is not a post made for Fongwah, I really have to crash my head on this device and the purpose of this post is to save your time. The fondwah S9 is a nice tool with a multi-language (on top of C library) SDK but it is delivered with no easy documentations, broken links and no reference on ISO-15693 support… I was a bit disappointed once the box opened.
Posted in Hardware
Tagged IoT, linux, NFC
ST Micro-Electronics is providing a development board with a Murata CMWX1ZZABZ-091 chip. This device is a module containing a STM32L0 chip (192Kb of Flash / 20Kb of RAM) associated with a Semtech SX1276 radio chip. This module can be used as a SoC for developing LoRaWan IoT devices. The Semtech chip is also capable of Sigfox. This module is a bit expensive but it is actually the one allowing LoRaWan and Sigfox communication in any of the RCZ zones.
There is actually no solution to get an alarm when a TTN gateway is shutting down. That said, all the information are accessible thanks to the different API.
To monitor my deployed gateways, I’ve made a little script in python working with IFTTT. It connects to the The Things Network api, get the gateway status and call the IFTTT webhook in case of last gateway update too old.
On IFTTT i’ve created an applet to generate a Push notification on phone to get the alarm.
The script is accessible in the post detail.
The Laird Sentrius LoRaWan gateway is a low cost, stable and easy to configure on The Things Network gateway. They are indoor gateway. I want to install it outdoor to offer a better coverage.
In certain situation the easiest way to install it outdoor is to use an external antenna and a long antenna cable. In some other situation this approach is complex to implement and the easiest way is to install the gateway outdoor with its antenna and network connection.
The best is to use an outdoor LoRaWan gateway. The price is usually > 600€. Even if in general the outdoor gateways includes GPS and Cellphone connectivity. In this post I’ll explain how I make one of Laird Sentrius outdoor because it costs less than 250€ for the gateway itself.
The HopeRF RFM95w module proposes to access LoRa at low cost. Its unitary price is around 4€ on shop like aliexpress. A version with a shield is also existing. Its name is Lora1276-C1 from niceRF. These different transceivers are using Semtech SX1276 chip. It makes this kind of chip interesting for regional low cost LoRaWAN design in association with a MCU. Here we are going to use it with an Arduino platform.
The Sigfox Micro basestation has been announced during the last Sigfox Connect event in Berlin. The base-station allow to extend the Sigfox public network, at low price, for your private location.
This post is detailing my experience with the micro base-station and the field test I’ve made on an industrial site.
The usual attack on Sigfox network is related to the “security”. Behind this large concept, for real, the only point is related to the use of clear payload over the air. As a consequence some are extending this to the possible replay after 2048 frames so regarding a standard use of Sigfox is will be about 6 month later…
That said, for real, all of this is just ignorance from these pseudo “security” experts and developer laziness. Don’t beat me for saying that, I’m part of the lazy developer, the only difference is I’m not complaining and I’m aware the solution is in my own hands.
Because, for real, the payload encryption exists as documented in the post I’ve published on May 2017 and detailed on the Feb 2017 technical security paper published by Sigfox or like in this document.
So saying the Sigfox is not proposing payload encryption is wrong and this option is also fixing any 6 months later message replay. It’s like saying WiFi is not secured because you can create an open-network.
So now, let’s see why encryption is not the default option, why a network encryption standard is not the best option and then see how to stop to be a lazy developer and make encryption working.
When you write an IoT firmware, there are different things you may never forget to think about… The coming 10 things you can’t ignore are coming from my experience of smart object creation and the associated field experience.
The field experience is unfortunately the real step where you will improve your firmware and discover all you have forgotten when you have written the firmware and tested it in your laboratory. In laboratory everything is perfect.
The following 10 things you can’t ignore when writing a Firmware is a non exhaustive checklist of points to verify before pushing your code to the field. It is also a list of test conditions you can execute to validate a Firmware / device made by a third party.