Security Security

The Perytons™ Protocol Analyzers support analysis of encrypted messages as well as re-encryption of messages (valid only if the Peryton-Traffic Generator Add-On is installed – see chapter ‎V.1).

Deciphering secured messages is possible if the required information is known to the Perytons™ Protocol Analyzer. This information includes keys, as well as additional information (e.g. security level and long mac address if not included in the message).

The Perytons™ Protocol Analyzer supports the following protocol layers security schemes:

IEEE 802.15.4 MAC

ZigBee NWL

ZigBee APS

ZigBee RF4CE

ZigBee Green Power

 

Security may be based on a single known key (i.e. Master Key), on a per-Network Key, or on a link key shared by any two devices.

The known security keys should be placed in the security keys table info by using the Security option in the Tools menu or when pressing the relevant icon in the Main Window Menu:

Picture115

Figure 252 – Security Tool Menu

Figure 253 – Security Keys List form

Perytons™ security processing parameters can be set either through this form or through the User Preferences – Processing Tab (See paragraph ‎19.8 for details). Setting through one of these two methods is sufficient.
Note: If after the initial Keys entered there is an interchange of Keys between devices and a new Key is created for use, the Perytons™ Protocol Analyzer will 'catch' the new Security Key 'On the Fly' and will automatically keep record of it and add it to the Keys List for use as an additional key.
This process is especially useful for protocol sessions that involve generation of new Link Keys based on a basic initial Security Key.