
ZigBee security
Implementing security on the XBee/XBee-PRO ZigBee RF Module
XBee/XBee-PRO® S2C ZigBee® RF Module
108
2. Configure one or more routers or end devices with the following settings:
a.
ID
= 2234
b.
EE
= 1
c.
KY
= 4455
d.
WR
(save networking parameters to preserve them through power cycle)
3. Read the
AI
setting on the coordinator and joining devices until they return 0 (formed or joined
a network).
This example sets the
EE
,
ID
, and
KY
commands the same on all devices. After successfully joining the
secure network, the network key encrypts all application data transmissions. Since
NK
was set to 0
on the coordinator, the device selects a random network key. Because the link key (
KY
) was
configured to a non- zero value on all devices, the pre-configured link key (
KY
) sendt the network key
encrypted when the devices joined.
Example 2: Forming a network with security (obtaining keys during joining)
1. Start a coordinator with the following settings:
a.
ID
= 2235
b.
EE
= 1
c.
NK
= 0
d.
KY
= 0
e.
WR
(save networking parameters to persist through power cycle)
2. Configure one or more routers or end devices with the following settings:
a.
ID
= 2235
b.
EE
= 1
c.
KY
= 0
d.
WR
(save networking parameters to persist through power cycle)
3. Read the
AI
setting on the coordinator and joining devices until they return 0 (formed or joined
a network).
This example sets the
EE
,
ID
, and
KY
commands the same on all devices. Since
NK
was set to 0 on the
coordinator, the device selects a random network key. Because
KY
was set to 0 on all devices, the
network key was sent unencrypted (“in the clear”) when the devices joined.
This approach introduces a security vulnerability into the network and is not
recommended.