SSZT545 february 2019 CC1352P , CC1354P10 , CC1354R10 , CC2652R
As a consumer, my world is built on ease of use and device interoperability; at home, I can control my connected smart lighting, heating and security system from my phone or an Amazon Echo. The wireless protocols powering these networks, such as Zigbee or Thread, offer distinct advantages and trade-offs including power consumption, network management, latency and more.
For home and building automation, Zigbee prioritizes something that cannot slip through the cracks: security. Wireless home or industrial networks can be tempting targets for hackers looking for data. Without proper security safeguards, home or building security systems are vulnerable to attackers looking to disable these systems, tamper with them or steal information.
Zigbee is an industry-proven worldwide standard for low-power, self-healing, robust mesh networks offering a complete and interoperable Internet of Things (IoT) framework for home and building automation systems. Zigbee 3.0, the latest specification from the Zigbee Alliance, incorporates improved security and robustness features such as trust center link key updates and install code enhancements to counter threats every day.
Zigbee 3.0 provides well-defined security procedures to request and change keys. In a Zigbee network, two devices must share the same keys in order to communicate.
There are two layers of encryption in Zigbee: the application support sublayer (APS) and the network layer (NWK). Previously, it was not mandatory to update the APS layer encryption key after joining the network.
The new functionality mandates that devices joining a Zigbee 3.0 centralized network must request a randomly generated trust center link key upon joining the network, which is used for all ongoing encrypted APS-layer communication.
This feature provides significant additional security to the system because a device won’t compromise the NWK key if it leaves and tries to rejoin the network; there is a second layer of mandatory encryption. As Figure 1 shows, Zigbee 3.0 coordinators are configurable to accept or reject legacy devices that do not initiate the trust center link key update procedure.
To enhance security even further, Zigbee 3.0 now offers the option to use pre-configured keys and install codes. Install codes are 128 bits of random data and a 16-bit cyclic redundancy check (CRC) that pass through a hash function to generate a trust center link key. Instead of using the global trust center link key to obtain the NWK key, Zigbee 3.0 enables developers to generate these keys with install codes.
Trust center link keys eliminate the use of well-known keys such that no well-known key is ever used to encrypt data over the air, making the system significantly more secure. Generally, install code-derived trust center link keys are hard-coded into devices during manufacturing, and the corresponding install code is included with the device and programmed into the network leader through an out-of-band method such as a user interface.
For IoT home and building automation systems, Texas Instruments (TI) SimpleLink™ CC1352P (shown in Fig. 2) and CC2652R devices integrate features such as:
TI’s royalty-free Zigbee software development kit (SDK) offers:
The Zigbee software architecture is shown below in Figure 3.
It is possible to build connected IoT home and building automation systems without the fear of malicious hackers or cybersecurity threats; Zigbee 3.0 is the key to a secure home and building network.