SENA ProBee-ZE20S-SEME User Manual
Page 26

ProBee-ZE20S-SExx User Guide Rev 1.8
26
successful completion of the CBKE protocol the following security services are offered:
Both devices share a secret link key
Implicit Key Authentication: Both devices know with whom they share this link key
Key Confirmation: Each device knows that the other device actually has computed the key
correctly
No Unilateral Key Control: No device has complete control over the shared link key that is
established
Perfect Forward Secrecy: if the private99 key gets compromised none of future and past
communications are exposed
Known Key Security resilience: Each shared link key created per session is unique
3.1.3
Link Key
The trust center (normally coordinator in network) requests link key before a device is trying to join
network. If link key the device has is wrong, joining process will be denied. Hence, all nodes in the
network should have the valid link key setup before joining the network. Before joining the network, link
key is generated by CBKE Data Token and Install Code. CBKE Data Token consist of ‘Device Implicit
Cert’, ‘CA Public Key’, and ‘Device Private Key’. The CBKE Data Token and Install Code is configured
using the AT command below.
AT+IMPLICIT= xxx
…
xxx or AT+IC = xxx
…
xxx, where xxx
…
xxx is 48-byte hexadecimal CBKE Data
Token(Device Implicit Cert).
AT+PUBLICKEY= xxx
…
xxx or AT+PK = xxx
…
xxx, where xxx
…
xxx is 43-byte hexadecimal CBKE Data
Token(CA Public Key & Device Private Key).
AT+INSTALLCODE= xxx
…
xxx or AT+IC = xxx
…
xxx, where xxx
…
xxx is 6/8/12/16-byte hexadecimal
Install Code.
3.1.4
Network Key
It is the network-wide key used to secure transmissions at the Network Layer. The network key encrypts
all transmissions at the Network Layer. The network key only needs to be set up for the coordinator.
AT+NWKKEY=xxx
…
xxx or AT+NK=xxx
…
xxx, where xxx
…
xxx is 128-bit hexadecimal network key.
Default is FFF
…
FF.
3.1.5
Update Key
A trust center can update the Network Key to help minimize the risk associated with a particular instance
of the network key being compromised. Key updates are broadcast by the trust center throughout the
network, encrypted using the current network key. Devices that hear the broadcast will not immediately