Score:0

How to ensure the data comes from verified source without using asymetric encryption

ag flag

I'm building a project that is remotely controlled using LoRa and I want to ensure, that nobody can imitate my transmitter and send packets to my receiver. Just encrypting sent data is not enough since someone can receive for example packet that opens the door and sent the same one from his transmitter. How do I make it so only I can send authorized packets? Another problem is that it's really likely that at least one device will lose power sometimes. I need to use something other than asymetric encryption.

fgrieu avatar
ng flag
The question's problem is so vaguely specified that it's hard to make an answer that's better than opinion, hence the close votes.
Score:4
kr flag

You need some kind of authentication of the source.

One solution can be to use pre-shared secret. To exchange the secret you need some reliable channel. Only you know if you have such a channel or not.

Another approach can be to use TESLA. A brief explanation see here.

Also other approaches can be used.

krystof18 avatar
ag flag
Just secret isn’t enough, If someone just records and playback the radio signal, he can imitate my transmiter. Or am I getting something wrong?
Daniel S avatar
ru flag
TESLA and other schemes defend against replay attacks by using time-stamping. This does assume that transmitter and receiver have a consistent time source. If you don't have a consistent time source but can pass information both ways, then a challenge-response exchange will also block replay.
kr flag
@krystof18: It depends on the scheme that you implement. For instance, if the sender includes a nonce, then you can recognize replayed message.
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.