Use the Makefile
to re-create the figures from the data measured during the experiments.
If necessary, the postprocessing steps will be executed again before building the figures using LaTeX.
For more details on the postprocessing, have a look at the process-paper-results.sh
shell script in each of the subdirectories.
make all # Builds all figures and tables
make figure10.pdf # Builds figure 10
See below for lists of figures and tables and their corresponding data sources.
Figure | Title | Data Source |
---|---|---|
01 pdf tex | Architecture of the ChirpOTLE framework | static figure |
02 pdf tex | Control flow in the security evaluation framework | static figure |
03 pdf tex | Message flow of the unidirectional wormhole | static figure |
04 pdf tex | Message flow of the rx2 wormhole | static figure |
05 pdf tex | LoRa frame transmission time | LoRa airtime formula, calculated in postprocessing of ADR spoofing |
06 pdf tex | Message flow of the downlink-delayed wormhole | static figure |
07 pdf tex | Concept of the beacon drifting attack | static figure |
08 pdf tex | Channel from ED to GW without attacker | baseline measurements (channel-aggregated-freq.cv ) |
09 pdf tex | Experimental setup | static figure |
10 pdf tex | Trigger for the ED to switch its DR | ADR spoofing results (adr_trig.csv ) |
11 pdf tex | Measured timing of the rx2 wormhole | ADR spoofing results (timing_info_rx2.csv ) |
12 pdf tex | Downlink availability during beacon drifting | Beacon spoofing results (downlink-availability.csv ) |
13 pdf tex | Beacon status at ED under attack | Beacon spoofing results (beacon-status.csv ) |
14 pdf tex | Beacon SNR during attack | Beacon spoofing results (beacon-status.csv ) |
Table | Title | Data Source |
---|---|---|
01 pdf tex | Evaluation parameters for the ADR spoofing attack | static data |
02 pdf tex | Number of transactions from start of attack until the DR is adjusted | ADR spoofing results (adr_rampup_aggregated.csv ) |
03 pdf tex | Evaluated values for delta t step | Calculated in postprocessing of beacon spoofing |