but i am unable to read the message supposedly due to som MIC issue, but how does that happen?
(Apparently the device has not been joined to any application, is this strictly necessary to decode simple packages when i have the other information such as Devkey and vice cersa? )
In fact the hexdump in the payload field of is bytes comprising the string “Hello [22]”
If you’re wondering why the message wasn’t printed as a string, it’s because you’re not supposed to send strings - that’s wastefully expansive.
Really you should be packing messages to bit level, at the very least using whole bytes efficiently.
There’s also no need to embedded a count, since you already have to send the frame count as part of the packet protocol header - see the 22 in the overview line of the message above the expansion.
Probably because your frame counter illegally rolled back, making it look like an attacker had recorded your old packets and was playing them back even though it was actually you sending new ones, improperly starting over from a low number.
You really need to make the frame counter continue across minor maintenance of the node firmware; otherwise you’re going to need to hit that “reset frame counters” button in your screenshot.