As a consumer, my world is built on ease of use and device interoperability; at home, I can control my connected smart lighting, heating and security system from my phone or an Amazon Echo. The wireless protocols powering these networks, such as Zigbee or Thread, offer distinct advantages and trade-offs including power consumption, network management, latency and more.
For home and building automation, Zigbee prioritizes something that cannot slip through the cracks: security. Wireless home or industrial networks can be tempting targets for hackers looking for data. Without proper security safeguards, home or building security systems are vulnerable to attackers looking to disable these systems, tamper with them or steal information.
Zigbee is an industry-proven worldwide standard for low-power, self-healing, robust mesh networks offering a complete and interoperable Internet of Things (IoT) framework for home and building automation systems. Zigbee 3.0, the latest specification from the Zigbee Alliance, incorporates improved security and robustness features such as trust center link key updates and install code enhancements to counter threats every day.
Zigbee 3.0 provides well-defined security procedures to request and change keys. In a Zigbee network, two devices must share the same keys in order to communicate.
There are two layers of encryption in Zigbee: the application support sublayer (APS) and the network layer (NWK). Previously, it was not mandatory to update the APS layer encryption key after joining the network.
The new functionality mandates that devices joining a Zigbee 3.0 centralized network must request a randomly generated trust center link key upon joining the network, which is used for all ongoing encrypted APS-layer communication.
This feature provides significant additional security to the system because a device won’t compromise the NWK key if it leaves and tries to rejoin the network; there is a second layer of mandatory encryption. As Figure 1 shows, Zigbee 3.0 coordinators are configurable to accept or reject legacy devices that do not initiate the trust center link key update procedure.
Figure 1: Diagram of a Zigbee 3.0 network allowing a device to join
To enhance security even further, Zigbee 3.0 now offers the option to use pre-configured keys and install codes. Install codes are 128 bits of random data and a 16-bit cyclic redundancy check (CRC) that pass through a hash function to generate a trust center link key. Instead of using the global trust center link key to obtain the NWK key, Zigbee 3.0 enables developers to generate these keys with install codes.
Trust center link keys eliminate the use of well-known keys such that no well-known key is ever used to encrypt data over the air, making the system significantly more secure. Generally, install code-derived trust center link keys are hard-coded into devices during manufacturing, and the corresponding install code is included with the device and programmed into the network leader through an out-of-band method such as a user interface.
Unlock the power and possibilities of Zigbee and Texas Instruments...
Figure 2: LAUNCHXL-CC1352P front view horizontal
For IoT home and building automation systems, Texas Instruments (TI) SimpleLink™ CC1352P (shown in Fig. 2) and CC2652R devices integrate features such as:
Advanced Encryption Standard 128-/256-bit crypto accelerators for more efficient encryption, yielding lower-power operation.
A 20-dBm integrated power amplifier for long-range applications.
A low-power sensor interface to sense while the device sleeps.
TI’s royalty-free Zigbee software development kit (SDK) offers:
Z-Stack™ software, a Zigbee 3.0-compliant stack.
Software examples for common applications (including electronic door locks, light switches and temperature sensors).
Comprehensive documentation and training to jump-start development.
The Zigbee software architecture is shown below in Figure 3.
Figure 3: Zigbee software architecture
It is possible to build connected IoT home and building automation systems without the fear of malicious hackers or cybersecurity threats; Zigbee 3.0 is the key to a secure home and building network.
Learn more about other Zigbee 3.0 security updates in the white paper, “What’s New in Zigbee 3.0.”
Check out the “Zigbee Selection Guide for SimpleLink MCUs.”
Order the CC26x2R wireless microcontroller (MCU) LaunchPad™ development kit.
Learn more about SimpleLink MCUs and the SimpleLink CC26x2 SDK.
Read the application report, “Z-Stack 3.1.0 End Device Power Consumption Measurement with the SimpleLink Wireless MCU Family.”
All content and materials on this site are provided "as is". TI and its respective suppliers and providers of content make no representations about the suitability of these materials for any purpose and disclaim all warranties and conditions with regard to these materials, including but not limited to all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement of any third party intellectual property right. No license, either express or implied, by estoppel or otherwise, is granted by TI. Use of the information on this site may require a license from a third party, or a license from TI.
TI is a global semiconductor design and manufacturing company. Innovate with 100,000+ analog ICs andembedded processors, along with software, tools and the industry’s largest sales/support staff.