P. 56 / 68
920MHz Band Wireless Device (Korea) USERS MANUAL EM-9121 Rev. 1
7.1.7 SECURITY DESIGN
Each child device needs to be authenticated by a parent device to join a wireless multihop network.
There are two authentication methods as follows.
• Encryption key authentication
• MAC address authentication
Refusal of specific child devices to join the network is possible by the following method.
• Connection refusal with MAC address
All wireless devices need encryption key authentication registration/setting to join the network.
MAC address authentication is arbitrary.
Using these two methods in combination realizes more enhanced security.
■
ENCRYPTION KEY AUTHENTICATION
The wireless multihop network adopts wireless communication coded with the AES cryptographic algorithm, in the similar manner
as other wireless networks such as Wi-Fi.
In joining the network, each child device needs to obtain a genuine encryption key necessary to encrypt and decrypt from a parent
device. The encryption key must be registered to the child devices in advance.
Specify the encryption key in 32 hexadecimal digits.
This encryption key is also used in data communication on the network.
Thus, the key of the child devices needs to be the same as that of the parent device when the participation is authenticated only by
the encryption key.
Set the encryption key in accordance with the table below.
[Table 7.8] Encryption key
DEVICE
SETTING
SPECIFICATIONS / RANGE
REMARKS
Parent
Required
Hexadecimal, 32 digits
Child
Required
Hexadecimal, 32 digits
Set the same key as that of the parent device.
■
MAC ADDRESS AUTHENTICATION
It is necessary to register MAC addresses of child devices, which are to be authenticated to participate in the network, to a parent
device in advance.
In this way, only the registered child devices can join the network.
With the MAC address authentication, it is possible to refuse the participation of a child device in the network from a malicious third
party.
In case of MAC address authentication, different encryption keys can be set to individual child devices.
Up to 200 MAC addresses can be registered.
The MAC addresses can be confirmed with the configuration tool of the wireless devices.
[Table 7.9] MAC address authentication
DEVICE
SETTING
SPECIFICATIONS / RANGE
REMARKS
Parent
Required
No / Yes
■
CONNECTION REFUSAL BASED ON MAC ADDRESS
In preparation for attacks from malicious third parties by MAC address spoofing or abuse of stolen devices, MAC addresses of such
wireless devices can be registered in the ‘connection refusal list’ so that participation of wireless devices having those MAC ad-
dresses in the network can be refused.
7.1.8 LOW-SPEED MOVING MODE
Specify whether a child device is installed at a fixed position or in a device moving at low speed.
[Table 7.10] Low-speed moving mode
DEVICE
SETTING
SPECIFICATIONS / RANGE
REMARKS
Child
Required
No / Yes
No: fixed
Yes: low-speed moving