USER MANUAL V1.0
© 2016 EnOcean | www.enocean.com
F-710-017, V1.0
PTM 535Z User Manual | v1.0 | March 2016 | Page 24/38
PTM 535Z – 2.4 GHZ PUSHBUTTON TRANSMITTER MODULE
3.4.2
MAC payload structure for secure commissioning telegrams
Figure 7 below shows the MAC payload structure of a secure commissioning telegram.
Figure 7: MAC Payload structure for secure commissioning telegrams
The following fields are used for secure commissioning telegrams:
Telegram Control (1 byte)
The
Telegram Control
field is set to 0x0C to identify a standard telegram (secure com-
munication will be established based on the commissioning telegram)
Source ID (4 bytes)
The
Source ID
field contains a 4 byte ID uniquely identifying each PTM 535Z device
Commissioning Command (1 byte)
The
Command
field is set to 0xE0 by PTM 535Z
Device Type (1 byte)
The
Device Type
field is set to 0x02 by PTM 535Z
Device Options (2 bytes)
The
Device Options
field is set to 0xF281 by PTM 535Z when operating in AES128 secure
mode with authentication.
Device-unique Security Key (16 bytes)
PTM 535Z implement a random, device-specific security key which is generated as part
of the production flow. During commissioning, this key is transmitted in encrypted for-
mat. Contact EnOcean for details.
Security Key Validation (4 bytes)
In order to ensure correct reception, an additional 4 byte validation value is provided.
Contact EnOcean for details.
Sequence Counter (4 bytes)
The
Sequence Counter
is an always incrementing counter which is used as part of the
security processing to avoid replay attacks (sending the same telegram again).
Receiving devices shall only accept data telegrams with sequence counter values higher
than that of the last received telegram; therefore the current value needs to be commu-
nicated during commissioning.