Table of Contents
Wireshark integrated sniffer
Note that only the development release of Wireshark contains a dissector for 6LoWPAN. There is currently no dissector for RPL or IEEE802.15.4e on Wireshark.
Wireshark Development Release on Linux
- Go to: http://www.wireshark.org/download.html click on "Development Release" then download the source code to a directory of your choice.
- Untar the file you just downloaded
- cd to the directory
- run ./configure (notice that this might fail several times; the reason is that the necessary packages might not be present on your machine; the easiest way to solve this is to read the error in the terminal, identify the missing package, use google to find its name then use apt-get install "package_name"; then try ./configure again... some packages you need are bison, flex, libgtk2.0-dev, libpcap-dev)
- run make (takes some time)
- sudo make install (also takes some time)
Notes: you don't need to remove your existing Wireshark version. The first time you run Wireshark, type ldconfig before. The one you just installed will be present in the directory where you built it and you can run it by opening a terminal and typing "sudo /.../yourDirectory/wireshark"
Using the Pre-programmed Raven Board on Linux
- Download http://sourceforge.net/projects/dot4-tools/files/sniffer/Linux%20Control%20Files/commandapp_linux_15APR2010.zip/download
- Unzip then compile using "gcc main.c -Wall -lcurses -o ravenusb"
- Plug-in the board then open up a terminal and type dmesg. You're looking for something associated with the board that has "hidraw" in it such as "dev/hidraw2"
- Once you find on which _hidraw_ the board is, go back to the directory where you compiled the program then type ./ravenusb -d /dev/hidraw2 -c 16 (this will change the sniffing channel to 16. You will need to unplug the board then plug it back in again because the command is stored in flash and won't take effect until the next boot sequence)
- Start Wireshark development release as root and select the interface that corresponds to the raven board
Notes: This is not very stable under Linux. However, a quick and dirty way to make sure it works is to repeat step 4 several times frantically before moving on to step 5 (credit goes to Nahira Sarmicanic)
Texas Instruments sniffer
To be completed...
16 channel sniffer
Channel Hopping is a technique proven to efficiently combat external interference and persistent multi-path fading. When using channel hopping, nodes send successive packets on different frequency channels, following a pseudo-random hopping pattern. With IEEE802.15.4-2006 hardware, 16 channels are available in the 2.4-2.485GHz frequency band.
Building a sniffer for such networks involves being able to listen to all 16 channels at the same time; this requires 16 radios. For this project, we use 16 off-the-shelf RZ USBstick boards by Atmel, connected to a single computer using USB hubs.
This project is hosted at http://wsn.eecs.berkeley.edu/trac/sniffer/.