SSZT545 february   2019 CC1352P , CC2652R

 

  1.   1
  2.   2
    1.     3
    2.     New Features
    3.     Unlock the Power and Possibilities of Zigbee and Texas Instruments
    4.     Conclusion
    5.     Additional Resources

Kirtana Moorthy

GUID-B8850837-5A47-48DE-820A-455CED6F0913-low.jpg

As a consumer, my world is built on ease of use and device interoperability; at home, I can control my connected smart lighting, heating and security system from my phone or an Amazon Echo. The wireless protocols powering these networks, such as Zigbee or Thread, offer distinct advantages and trade-offs including power consumption, network management, latency and more.

For home and building automation, Zigbee prioritizes something that cannot slip through the cracks: security. Wireless home or industrial networks can be tempting targets for hackers looking for data. Without proper security safeguards, home or building security systems are vulnerable to attackers looking to disable these systems, tamper with them or steal information.

Zigbee is an industry-proven worldwide standard for low-power, self-healing, robust mesh networks offering a complete and interoperable Internet of Things (IoT) framework for home and building automation systems. Zigbee 3.0, the latest specification from the Zigbee Alliance, incorporates improved security and robustness features such as trust center link key updates and install code enhancements to counter threats every day.

New Features

Zigbee 3.0 provides well-defined security procedures to request and change keys. In a Zigbee network, two devices must share the same keys in order to communicate.

There are two layers of encryption in Zigbee: the application support sublayer (APS) and the network layer (NWK). Previously, it was not mandatory to update the APS layer encryption key after joining the network.

The new functionality mandates that devices joining a Zigbee 3.0 centralized network must request a randomly generated trust center link key upon joining the network, which is used for all ongoing encrypted APS-layer communication.

This feature provides significant additional security to the system because a device won’t compromise the NWK key if it leaves and tries to rejoin the network; there is a second layer of mandatory encryption. As Figure 1 shows, Zigbee 3.0 coordinators are configurable to accept or reject legacy devices that do not initiate the trust center link key update procedure.

GUID-8F542A57-4A61-4F5D-9620-110D0B090848-low.png Figure 1 Diagram of a Zigbee 3.0 Network Allowing a Device to Join

To enhance security even further, Zigbee 3.0 now offers the option to use pre-configured keys and install codes. Install codes are 128 bits of random data and a 16-bit cyclic redundancy check (CRC) that pass through a hash function to generate a trust center link key. Instead of using the global trust center link key to obtain the NWK key, Zigbee 3.0 enables developers to generate these keys with install codes.

Trust center link keys eliminate the use of well-known keys such that no well-known key is ever used to encrypt data over the air, making the system significantly more secure. Generally, install code-derived trust center link keys are hard-coded into devices during manufacturing, and the corresponding install code is included with the device and programmed into the network leader through an out-of-band method such as a user interface.

Unlock the Power and Possibilities of Zigbee and Texas Instruments

GUID-E017E800-31FB-4FDA-93FB-BBCF5D2FEF8D-low.png Figure 2 LAUNCHXL-CC1352P Front View Horizontal

For IoT home and building automation systems, Texas Instruments (TI) SimpleLink™  CC1352P (shown in Fig. 2) and CC2652R devices integrate features such as:

  • Advanced Encryption Standard 128-/256-bit crypto accelerators for more efficient encryption, yielding lower-power operation.
  • A 20-dBm integrated power amplifier for long-range applications.
  • A low-power sensor interface to sense while the device sleeps.

TI’s royalty-free Zigbee software development kit (SDK) offers:

The Zigbee software architecture is shown below in Figure 3.

GUID-11E51B65-E208-4491-AE81-CD797030D005-low.png Figure 3 Zigbee Software Architecture

Conclusion

It is possible to build connected IoT home and building automation systems without the fear of malicious hackers or cybersecurity threats; Zigbee 3.0 is the key to a secure home and building network.

Additional Resources