Security with Zigbee Applications#
Silicon Labs offers a range of security features depending on the part you are using and your application and production needs. As well as the security features available, this section describes security issues specific to Zigbee.
IoT Security Fundamentals: Introduces the security concepts that must be considered when implementing an Internet of Things (IoT) system. Using the ioXt Alliance's eight security principles as a structure, it clearly delineates the solutions Silicon Labs provides to support endpoint security and what you must do outside of the Silicon Labs framework.
Zigbee Security: Introduces some basic security concepts, including network layer security, trust centers, and application support layer security features. It then discusses the types of standard security protocols available in Zibee EmberZNet. Coding requirements for implementing security are reviewed in summary. Finally, information on implementing Zigbee Smart Energy security is provided.
Using Installation Codes with Zigbee Devices: Explains how to use Simplicity Commander to check, write, verify, and erase installation codes on Silicon Labs Wireless Gecko (EFR32) devices.
Series 2 and Series 3 Secure Debug: Explains the different debug lock and unlock features available in Series 2 and Series 3 devices and their capabilities.
Production Programming of Series 2 and Series 3 Devices: Demonstrates how to properly program, provision, and configure Series 2 and Series 3 devices in a production environment.
Anti-Tamper Protection Configuration and Use: Describes how to program, provision, and configure the Secure Engine anti-tamper module. The anti-tamper module is only available on Secure Vault High and Series 3 Secure Vault devices.
Authenticating Silicon Labs Devices using Device Certificates: Describes how to authenticate an EFR32 Series 2 device with Secure Vault, using secure device certificates and signatures.
Secure Key Storage: Explains how to securely "wrap" keys in EFR32 Series 2 devices with Secure Vault, so they can be stored in non-volatile storage.
Programming Series 2 Devices Using the DCI and SWD: Describes how to provision and configure Series 2 devices through the DCI and SWD.
Integrating Crypto Functionality with PSA Crypto vs. Mbed TLS: Describes how to integrate crypto functionality into applications using PSA Crypto compared to Mbed TLS.