Skip to content

Latest commit

 

History

History
39 lines (32 loc) · 4.01 KB

File metadata and controls

39 lines (32 loc) · 4.01 KB

Replicability

Use the Makefile to re-create the figures from the data measured during the experiments. If necessary, the postprocessing steps will be executed again before building the figures using LaTeX. For more details on the postprocessing, have a look at the process-paper-results.sh shell script in each of the subdirectories.

make all # Builds all figures and tables
make figure10.pdf # Builds figure 10

See below for lists of figures and tables and their corresponding data sources.

Figures

Figure Title Data Source
01 pdf tex Architecture of the ChirpOTLE framework static figure
02 pdf tex Control flow in the security evaluation framework static figure
03 pdf tex Message flow of the unidirectional wormhole static figure
04 pdf tex Message flow of the rx2 wormhole static figure
05 pdf tex LoRa frame transmission time LoRa airtime formula, calculated in postprocessing of ADR spoofing
06 pdf tex Message flow of the downlink-delayed wormhole static figure
07 pdf tex Concept of the beacon drifting attack static figure
08 pdf tex Channel from ED to GW without attacker baseline measurements (channel-aggregated-freq.cv)
09 pdf tex Experimental setup static figure
10 pdf tex Trigger for the ED to switch its DR ADR spoofing results (adr_trig.csv)
11 pdf tex Measured timing of the rx2 wormhole ADR spoofing results (timing_info_rx2.csv)
12 pdf tex Downlink availability during beacon drifting Beacon spoofing results (downlink-availability.csv)
13 pdf tex Beacon status at ED under attack Beacon spoofing results (beacon-status.csv)
14 pdf tex Beacon SNR during attack Beacon spoofing results (beacon-status.csv)

Tables

Table Title Data Source
01 pdf tex Evaluation parameters for the ADR spoofing attack static data
02 pdf tex Number of transactions from start of attack until the DR is adjusted ADR spoofing results (adr_rampup_aggregated.csv)
03 pdf tex Evaluated values for delta t step Calculated in postprocessing of beacon spoofing