Академический Документы
Профессиональный Документы
Культура Документы
Robert Cragie Chair, ZigBee Alliance ZARC Securit y Task Group Principal Engineer, Jennic Ltd.
Specification constraints
The specificat ion assumes an 'open t rust ' model where t he prot ocol st ack layers t rust each ot her This is not unreasonable for t he t ype of devices ZigBee is aimed at , e.g. single-chip wireless microcont rollers ex ecut ing t he whole st ack on a single CPU This implies t hat crypt ographic prot ect ion only occurs bet ween devices The same securit y suit e level is used for all services
2009 ZigBee Alliance. All right s reserved.
Distribution m ethods
Pre-inst allat ion is where keys are placed int o device using out -of-band met hod, e.g. commissioning t ool Transport is where t he Trust Cent er sends t he key (securely wherever possible) t o t he device Est ablishment is where t he device negot iat es wit h t he Trust Cent er and keys are est ablished at eit her end wit hout being t ransport ed SKKE (Symmet ric Key Key Est ablishment ) CBKE (Cert ificat e-based Key Est ablishment ) ASKE (Alpha-secure Key Est ablishment )
2009 ZigBee Alliance. All right s reserved.
Key types
There are t hree key t ypes: Mast er key Shared key for SKKE only Link key Net work key
Link key
Key which is uniquely shared bet ween t wo and only t wo devices for prot ect ing frames at t he APS layer One of t hose devices is normally t he Trust Cent er Usually dynamically est ablished using key est ablishment service Can also be pre-inst alled or t ransport ed from t he Trust Cent er
Network key
Global key which is used by all devices in t he net work A set of net work keys is held by t he Trust Cent er and current net work key is ident ified by a key sequence number Usually t ransport ed from t he Trust Cent er Can also be pre-inst alled Two st age updat e mechanism Updat e new key and associat ed key sequence number Swit ch t o new key sequence number
2009 ZigBee Alliance. All right s reserved.
10
11
Fram e protection
The securit y suit e used is AES-CCM* The securit y level used in ZigBee (level 5) means AES_CCM* is t he same as AES-CCM AES-CCM is NIST special publicat ion 800-38C Low-cost implement at ion in t erms of resources Some wireless microcont rollers have hardware support for AES-CCM or AES-CCM* Two part s t o prot ect ion Encrypt ion Int egrit y prot ect ion ZigBee securit y uses level 5 in t he AES-CCM* suit e Encrypt ed MIC lengt h 4 oct et s
2009 ZigBee Alliance. All right s reserved.
12
13
FCS
NWK HDR
PHY PDU
SYNC
PHY HDR
MAC HDR
FCS
NWK HDR
Auxiliary Header
MIC
14
FCS
NWK HDR
APS HDR
PHY PDU
SYNC
PHY HDR
MAC HDR
FCS
NWK HDR
APS HDR
Auxiliary Header
MIC
15
FCS
NWK HDR
APS HDR
PHY PDU
SYNC
PHY HDR
MAC HDR
FCS
NWK HDR
Auxiliary Header
MIC
APS HDR
Auxiliary Header
MIC
16
Joining scenario
ZigBee Coordinat or normally act s as Trust Cent er Walk t hrough device wit hout net work key and wit h preconfigured TC link key Common securit y model
Coordinator Router End Device Mesh link End device star link
17
2: Router sends device update to TC for authorization 4 1 5 3: TC prepares network key transport for joining device secured with pre-configured TC link key shared between TC and joining device and tunnels it to router 4: Router unpacks tunneled network key transport and sends to device unsecured at network layer 5: Device retrieves network key from network key transport using pre-configured TC link key
Trust Center Router End Device Mesh link End device star link APSME commands
2009 ZigBee Alliance. All right s reserved.
18
19
20