
XDL120 | User Manual
24 | 25
Data subj ect to change without notice
Bosch Connected Devi ces and Sol utions
4.5.2
Access to Networks
The XDK user is responsible to realize a sufficient access of the XDK device to required networks. This is necessary to be
able to use features like data streaming or global time stamp. The security needs to get a protected access to the internet
strongly depends on the use case scenarios (see section 4.3). In the first use case scenario the XDK user is the owner of
the access network. The XDK user is able to protect the network against unauthorized access through third parties using
state of the art security mechanisms like Wi-Fi Protected Access 2 (WPA2) based on the standard IEEE 802.11i and e.g.
whitelisting of the MAC addresses.
In the third use case scenario, the user is not the owner of the access network (e.g. Hotspot in a cafe). Therefore, the user
has no possibility to realize any access restrictions. It is recommended to focus on the protection of the data. This can be
the restriction of physical access to the device, and disabling the data streaming option and only store data on the device.
CAUTION
If an access of unauthorized third parties is easily possible and the XDK device is part of a protected network, the XDK
user should consider the following security requirements to protect the WLAN network credentials:
To set up the network connection, copy only the wlan.txt on the microSD card, insert it into the XDK, and switch the
device on. The credentials will then be read and transferred to the flash memory. Now switch off the XDK, and replace
the microSD card or delete the wlan.txt from the card. This way, if a third party gains access to the card, the network
credentials are protected.
The XDK will always use the internally saved network credentials, unless at startup a wlan.txt file is discovered, in which
case the new file will be read and the internally saved configuration will be overwritten. Therefore, to delete the internally
saved credentials, modify the SSID / PASSWORD fields in the wlan.txt file to be empty, and use it once during startup.
4.6
Encryption
As previously described, it is recommended to use state of the art security mechanisms for network communication if
WLAN streaming is used. The XDK120 will log or transmit sensor data in binary form. To maximize the logging
performance, those files however are not additionally encrypted.
4.7
Termination of service
If the life cycle of the XDL120 ends or the purchased licence expires, the user should remove all external memory
storages. In addition, the user should delete all data and perform a secure overwriting. This can be done by sending a
command "E” to the XDK device running in Bootloader mode via the XDK workbench. This will delete the content on the
XDK device.
5
Known Issues
While configured to log data without enabling auto save, Wi-Fi is disabled and the application tries to connect to a SNTP
server and therefore displays an SNTP LED Error
6
References
XDK workbench and development tool kit reference: https://xdk.bosch-connectivity.com/software
Data sheets for the sensors integrated in XDK can be found on the website of Bosch Sensortec:
https://www.bosch-
sensortec.com
, or Maxim Integrated:
https://www.maximintegrated.com/