Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

1
  • $\begingroup$ Hi Patrick M :) thank you for the response.Not being an expert in hacking I don't know what to do against that? In my case I knew that a RF module is vulnerable to MITM because the attacker receives the communication (broadcast) ,blocks the targeted receiver preventing it from getting the telegram (by overwhelming it with telegrams) and relays it to a later moment.How to prevent that? I have no idea ...because even if I define an authentication with time limited validation and an nonce the attacker might not be able to relay valid commands but he might prevent my module from working correctly $\endgroup$ Commented Sep 18, 2015 at 7:54