ZB security XBee security examples
XBee/XBee-PRO ZigBee RF Modules User Guide 81
c. KY=4455
d. WR (save networking parameters to preserve them through power cycle)
3 Read the AI setting on the coordinator and joining devices until they return 0 (formed or joined a
network).
In this example, EE, ID, and KY are set the same on all devices. After successfully joining the secure
network, all application data transmissions will be encrypted by the network key. Since NK was set
to 0 on the coordinator, a random network key was selected. And since the link key (KY) was
configured the same on all devices, to a non-zero value, the network key was sent encrypted by the
preconfigured link key (KY) when the devices joined.
Example 2: forming a network with security (obtaining keys during
joining)
1 Start a coordinator with the following settings:
1 ID=2235
a. EE=1
b. NK=0
c. KY=0
d. WR (save networking parameters to preserve them through power cycle)
2 Configure one or more routers or end devices with the following settings:
a. ID=2235
b. EE=1
c. KY=0
d. WR (save networking parameters to preserve them through power cycle)
3 Read the AI setting on the coordinator and joining devices until they return 0 (formed or joined a
network).
In this example, EE, ID, and KY are set the same on all devices. Since NK was set to 0 on the
coordinator, a random network key was selected. And since KY was set to 0 on all devices, the
network key was sent unencrypted (“in the clear”) when the devices joined. This approach
introduces a security vulnerability into the network and is not recommended.