AN1089: Using Installation Codes with Zigbee Devices

2020-11-19

This application note provides an overview of using installation codes with Zigbee devices. It also explains (with the help of examples) how to use the EM3xx utilities or Simplicity Commander to check, write, verify, and erase installation codes on Silicon Labs EM3x and Wireless Gecko (EFR32™) devices. Finally, it provides a complete example of how to join a Z3 network with an installation code-derived link key.
Silicon Labs recommends that you be familiar with creating example applications and using the Network Analyzer, as described in QSG106: Getting Started with EmberZNetPRO.
KEY POINTS:
• Concepts of the Zigbee installation code.
• Programming examples for installation codes on EM3x and EFR32 devices.
• Checking, writing, verifying, and erasing installation codes on target devices.
• Joining a Z3 network with an installation code-derived link key.
Zigbee installation codes, sometimes also referred to as "install codes," are provided as a means for a device to join a Zigbee network in a reasonably secure fashion. The installation code itself is a random value installed on the joining device at manufacturing time, and is used to encrypt the initial network key transport from the Zigbee network’s centralized Trust Center device (the coordinator) to the joining device. With the creation of the Zigbee 3.0 standard in late 2016, all Zigbee devices capable of joining networks (as opposed to forming them) must support the use of installation codes during joining, as this is a requirement for Zigbee 3.0 compliance.
The installation code can be thought of as similar to the PIN code on Bluetooth devices when two devices are paired. The PIN code is provided as an authorization code for the parent device so that the joining device knows it is receiving information securely, such as when a hands-free headset is paired to a smartphone.
The installation code is typically printed on the case or packaging of the device, either as a hexadecimal string or in an encoded fashion such as a barcode or QR code, and provided through an out-of-band mechanism to the Trust Center device or its associated web/cloud interface, along with the 64-bit IEEE MAC address ("EUI64") of the device. If this device-specific data is stored on a remote web server or cloud-based system, that remote system then securely transports that information to the Trust Center to establish security credentials for the joining device in advance of the in-band joining process.

Silicon Labs

EFR32

More

Part#

More

More

Application note & Design Guide

More

More

Please see the document for details

More

More

English Chinese Chinese and English Japanese

2018/09/25

Rev. 0.2

AN1089

662 KB

- The full preview is over. If you want to read the whole 13 page document,please Sign in/Register -
  • +1 Like
  • Add to Favorites

Recommend

All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.

Contact Us

Email: