Security with Zigbee Applications#

Silicon Labs offers a range of security features depending on the part you are using and your application and production needs. As well as the security features available, this section describes security issues specific to Zigbee.

  • IoT Security Fundamentals: Introduces the security concepts that must be considered when implementing an Internet of Things (IoT) system. Using the ioXt Alliance's eight security principles as a structure, it clearly delineates the solutions Silicon Labs provides to support endpoint security and what you must do outside of the Silicon Labs framework.

  • Zigbee Security: Introduces some basic security concepts, including network layer security, trust centers, and application support layer security features. It then discusses the types of standard security protocols available in Zibee EmberZNet. Coding requirements for implementing security are reviewed in summary. Finally, information on implementing Zigbee Smart Energy security is provided.

  • Using Installation Codes with Zigbee Devices: Explains how to use Simplicity Commander to check, write, verify, and erase installation codes on Silicon Labs Wireless Gecko (EFR32) devices.

  • Series 2 Secure Debug: Describes how to lock and unlock the debug access of EFR32 Gecko Series 2 devices. Many aspects of the debug access, including the secure debug unlock are described. The Debug Challenge Interface (DCI) and Secure Engine (SE) Mailbox Interface for locking and unlocking debug access are also included.

  • Production Programming of Series 2 Devices: Provides details on programming, provisioning, and configuring Series 2 devices in production environments. Covers Secure Engine Subsystem of Series 2 devices, which runs easily upgradeable Secure Engine (SE) or Virtual Secure Engine (VSE) firmware.

  • Anti-Tamper Protection Configuration and Use: Shows how to program, provision, and configure the anti-tamper module on EFR32 Series 2 devices with Secure Vault.

  • Authenticating Silicon Labs Devices using Device Certificates: Describes how to authenticate an EFR32 Series 2 device with Secure Vault, using secure device certificates and signatures.

  • Secure Key Storage: Explains how to securely "wrap" keys in EFR32 Series 2 devices with Secure Vault, so they can be stored in non-volatile storage.

  • Programming Series 2 Devices Using the DCI and SWD: Describes how to provision and configure Series 2 devices through the DCI and SWD.

  • Integrating Crypto Functionality with PSA Crypto vs. Mbed TLS: Describes how to integrate crypto functionality into applications using PSA Crypto compared to Mbed TLS.