ZigBee Security

- notes regarding Zigbee security, how it is implemented and how it is included within the Zigbee specification.

Security is an issue which is of paramount importance for any wireless system. Zigbee security is no less important than that for any other system.

With Zigbee being used for monitoring and control applications, its security needs to be more than sufficient to fend off any hackers who may want to take control of the system it is controlling or monitoring.

Zigbee susceptibility to attack

There are many ways in which a system such as Zigbee can have its security compromised, or suffer some form of attack.

  • Signal interference:   One way in which a Zigbee network could be attacked is to introduce interference onto the frequency used. Although Zigbee can move channels in the presence of interference, this is relatively slow - it is not a frequency hopping ability
  • Denial of Service:   Full Denial of Service attacks can be overcome to some degree by changing frequency, although as mentioned above the frequency change process is relatively slow, and any hacker would be able to follow. .

    However Zigbee transmissions are not particularly easy to detect - they are low power and normally very intermittent, although within a large mesh net, transmissions will be much more frequent negating this aspect.

Zigbee authorisation

In order to prevent unwanted users accessing a network, Zigbee authorisation is used. Although the original releases of the Zigbee standard did not have a particularly robust system, this has not been largely overcome.

Zigbee PRO standard includes two security modes:

  • Standard:   The standard security option is only used where security is of little importance. Normally the high security option is used.
  • High security:   This is the standard that is normally used. It offers a high level of security in view of the fact that it could have disastrous consequences if the system were hacked and taken over.

    Zigbee authentication is performed using an Elliptical Curve Menzies-Qu-Vanstone, ECMQV, key establishment mechanism. This utilises a pre-shared key, and provides a very effective form of authentication.

    Some smart energy systems require the use of an additional Matyas-Meyer-Oseas function to generate the pre-configured key.

By Ian Poole


<< Previous   |   Next >>


Want more like this? Register for our newsletter









Whitepapers
Redefining LTE for IoT
ARM and NextG-Com explain how LTE with its high data rates, complexity and capacity can be used to provide effective communications for IoT with its lower complexity and data rate requirements.

More whitepapers

Training
Modern Digital Radio Techniques (RF6-1114)
Obtain a thorough grounding digital radio techniques that form the basis of much of today's wireless communications.

More training courses

From Machine to Machine to the Internet of Things
From Machine to Machine to the Internet of Things

Vlasios Tsiatsis, Ioannis Fikouras, Stefan Avesand, Stamatis Karnouskos, Catherine Mulligan, David Boyle, Jan Holler
Machine to machine communications is set to grow at a very fast rate. New...
Read more . .

USA bookstore UK bookstore









Radio-Electronics.com is operated and owned by Adrio Communications Ltd and edited by Ian Poole. All information is © Adrio Communications Ltd and may not be copied except for individual personal use. This includes copying material in whatever form into website pages. While every effort is made to ensure the accuracy of the information on Radio-Electronics.com, no liability is accepted for any consequences of using it. This site uses cookies. By using this site, these terms including the use of cookies are accepted. More explanation can be found in our Privacy Policy