SWRA782 October   2023 CC1311P3 , CC1311R3 , CC1312PSIP , CC1312R , CC1312R7 , CC1314R10 , CC1352P , CC1352P7 , CC1352R , CC1354P10

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Overview
    1. 1.1 Acronyms
    2. 1.2 Regulatory Compliance
      1. 1.2.1 TI 15.4 Stack
      2. 1.2.2 Regulatory Body
        1. 1.2.2.1 SUB 1
          1. 1.2.2.1.1 ETSI
          2. 1.2.2.1.2 ARIB
          3. 1.2.2.1.3 FCC
    3. 1.3 Polite Spectrum Access Timing Parameters
      1. 1.3.1 2.4 GHz
      2. 1.3.2 Coexistence
  5. 2Reference Examples
    1. 2.1 Available Chipsets
    2. 2.2 Flash and RAM Allocation
  6. 3Software Block Diagram
  7. 4Network Features
    1. 4.1 15.4 Supported PHYS
    2. 4.2 15.4 Device Architecture
    3. 4.3 15.4 Network Topology
      1. 4.3.1 Supported Network Modes
      2. 4.3.2 Beacon-Enabled Mode
      3. 4.3.3 Non Beacon-Enabled Mode
      4. 4.3.4 Frequency Hopping Mode
  8. 5Security
  9. 6Performance and Test Data
    1. 6.1 Test Data
    2. 6.2 Large Network Stability Tests
      1. 6.2.1 Sub1G
      2. 6.2.2 2.4 GHz
    3. 6.3 Transmission Rate
      1. 6.3.1 One Sensor Network
      2. 6.3.2 Five Sensor Network
      3. 6.3.3 47- Sensor Network
  10. 7Out-of-the Box-Experience
  11. 8Tools
    1. 8.1 Code Composer Studio
    2. 8.2 Sysconfig
    3. 8.3 Packet Sniffer
    4. 8.4 Battery Life Calculator
    5. 8.5 Linux

Security

The TI TI 15.4-Stack supports AES encryption as defined by IEEE802.15.4 specification. The application is responsible for key management, this is not done by TI 15.4-Stack initially. However, the application allows the developer to:

  • Privacy
  • Connect only trusted sources
  • Avoid tracking

TI Simplelink devices include an AES accelerator, an ECC public key generator and a TRNG to support security measures. Several security enabled examples provided within the SDK.

Table 5-1 Security Commissioning Features Supported by TI 15.4 SDK Examples
Keys Device Key
-Collector stores device key of every device
Network Key (Predefined)
-Known by every device
Encryption-Layer MAC-Layer Encryption
Decryption-Layer MAC-Layer Decryption
AES-CCM-MIC with 128-bit key
Key Storage Keys stored in MAC layer
Key Exchange ECDH P-256 (supported) Anonymous key agreement protocol
Key Derivation Algorithm AES-CMAC and TRNG
A shared secret is used to generate device key
Authentication Just Allow:
-no authentication
-no MITM protection
Default Code:
-MITM-protection
Passkey:
-Collector: must be entered
-Sensor: Displays authentication
Key Refreshment TI provided API for key refreshment
GUID-20230714-SS0I-CZSG-0HJD-VGTZJS9DKJVN-low.svg Figure 5-1 Security Implementation