Help


from Wikipedia
« »  
Keys are the cornerstone of the security architecture ; as such their protection is of paramount importance, and keys are never supposed to be transported through an insecure channel.
A momentary exception to this rule occurs during the initial phase of the addition to the network of a previously unconfigured device.
The ZigBee network model must take particular care of security considerations, as ad hoc networks may be physically accessible to external devices and the particular working environment cannot be foretold ; likewise, different applications running concurrently and using the same transceiver to communicate are supposed to be mutually trustworthy: for cost reasons the model does not assume a firewall exists between application-level entities.

2.411 seconds.