Compile the oos_sniffer proiject and flash your mote: (for example using OpenMote-CC2538)
sudo scons board=openmote-cc2538 toolchain=armgcc revision=A1 bootload=/dev/ttyUSB0 oos_sniffer |
Then connect the mote through USB and open openVisualizer run: scons runweb
sudo scons runweb |
Alternatively you can run the openvisualizer client which will provide a command line interpreter to manage the sniffer. The commands to be used are listed here . If you follow this approach jump to step 4. directly.
sudo scons runcli |
set <port_name> channel <value>
Note that a wireshark dissector for IETF 6TiSCH and IEEE802.15.4e is available here
We highly recommend you take a look at Colin O'Flynn's solution which integrates a RZUSBstick-based sniffer with Wireshark.
Note that only the development release of Wireshark contains a dissector for 6LoWPAN. There is currently no dissector for RPL or IEEE802.15.4e on Wireshark.
Notes: you don't need to remove your existing Wireshark version. The first time you run Wireshark, type ldconfig
before. The one you just installed will be present in the directory where you built it and you can run it by opening a terminal and typing "sudo /.../yourDirectory/wireshark"
Notes: This is not very stable under Linux. However, a quick and dirty way to make sure it works is to repeat step 4 several times frantically before moving on to step 5 (credit goes to Nahira Sarmicanic)
To be completed...
Channel Hopping is a technique proven to efficiently combat external interference and persistent multi-path fading. When using channel hopping, nodes send successive packets on different frequency channels, following a pseudo-random hopping pattern. With IEEE802.15.4-2006 hardware, 16 channels are available in the 2.4-2.485GHz frequency band.
Building a sniffer for such networks involves being able to listen to all 16 channels at the same time; this requires 16 radios. For this project, we use 16 off-the-shelf RZ USBstick boards by Atmel, connected to a single computer using USB hubs.
This project is hosted at http://wsn.eecs.berkeley.edu/trac/sniffer/.