Home of RF and Wireless Vendors and Resources

One Stop For Your RF and Wireless Need

z-wave security | basics of z-wave security in zwave networks


This tutorial section on z-wave basics covers following sub topics:
Main Page   PHY layer   MAC layer   protocol stack   security   conformance tests  


This page on z-wave security covers basics of z-wave security used in zwave networks.

Following are features used in z-wave security:
• Message Freshness: 64 bit Nonce
• 128 bit random network key:Kn
• Encryption: AES-OFB
• Data Authentication: AES-CBCMAC
• 128 bit Cipher and MAC Keys: Derived from Kn
•  Custome Jey Establishment Protocol, as explained below.


z-wave security

Z-Wave data origin authentication is based on the cipher block chaining message authentication code i.e. CBC-MAC technique. This technique calculates a message authentication code i.e. MAC from a block cipher algorithm such as AES. Figure describes K-exchange protocol used in z-wave security.



z-wave basic resources

z-wave tutorial
z-wave physical layer-PHY
z-wave MAC layer
z-wave protocol stack
z-wave security basics
z-wave device conformance testing

               


Wireless System Security Related Links

3G Security   LTE Security   GSM Security   Zigbee Security   Z-wave Security   Web App. Security  


Share this page

Translate this page