we see the Encrypted MIC value. The MIC value is used to authenticate the sender of the data packet to
ensure that the data was sent by a peer device in the link and not by a third party attacker. The actual
decrypted data appears between the Payload Length and the MIC in the packet. This is shown in the
Binary
pane below the
Summary
pane.
Figure 15 - Decrypted Data Example (Frame# 39,723)
Author: John Trinkle
Publish Date: 9 April 2014
Revised: 23 May 2014
TELEDYNE LECROY
Appendicies
203
Frontline BPA low energy Hardware & Software User Manual
Summary of Contents for BPA LOW ENERGY
Page 1: ...Hardware and Software User Manual Revision Date 1 3 2017...
Page 222: ......