This chapter describes how ZigBee applications interact with other ZigBee applications. It describes what constitutes a ZigBee network, how individual nodes are addressed, and how to address application objects within a node. Terms such as PAN ID, extended PAN ID, network address, profile ID, cluster, endpoint, attribute, and command will become clear (if I have done my job). This chapter is filled with plenty of examples. If you're a developer and read only one chapter in this book, read this one.
4.8. ZigBee AES 128-Bit Security
The ZigBee security suite is built on the Advanced Encryption (AES-128 bit) Standard, a well-respected block cipher algorithm published by the National Institute of Standards and Technology (NIST). To read more about ...
Get Zigbee Wireless Networking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.