ZigBee security Implementing security on the XBee/XBee-PRO ZigBee RF Module
XBee/XBee-PRO® S2C ZigBee® RF Module
108
2. Configure one or more routers or end devices with the following settings:
a. ID = 2234
b. EE = 1
c. KY = 4455
d. WR (save networking parameters to preserve them through power cycle)
3. Read the AI setting on the coordinator and joining devices until they return 0 (formed or joined
a network).
This example sets the EE, ID, and KY commands the same on all devices. After successfully joining the
secure network, the network key encrypts all application data transmissions. Since NK was set to 0
on the coordinator, the device selects a random network key. Because the link key (KY) was
configured to a non- zero value on all devices, the pre-configured link key (KY) sendt the network key
encrypted when the devices joined.
Example 2: Forming a network with security (obtaining keys during joining)
1. Start a coordinator with the following settings:
a. ID = 2235
b. EE = 1
c. NK = 0
d. KY = 0
e. WR (save networking parameters to persist through power cycle)
2. Configure one or more routers or end devices with the following settings:
a. ID = 2235
b. EE = 1
c. KY = 0
d. WR (save networking parameters to persist through power cycle)
3. Read the AI setting on the coordinator and joining devices until they return 0 (formed or joined
a network).
This example sets the EE, ID, and KY commands the same on all devices. Since NK was set to 0 on the
coordinator, the device selects a random network key. Because KY was set to 0 on all devices, the
network key was sent unencrypted (“in the clear”) when the devices joined.
This approach introduces a security vulnerability into the network and is not
recommended.