This is an old revision of the document!
Zigbee is a low‑power, low‑data‑rate wireless protocol for building sensor/actuator networks (home automation, smart energy, lighting, industrial monitoring). It sits on top of IEEE 802.15.4 radios and adds networking, security, and application profiles.
Topic | Value | Notes |
---|---|---|
Frequency bands | 2.4 GHz (worldwide); optional sub‑GHz 868/915 MHz | 2.4 GHz is by far the most common |
Channels (2.4 GHz) | 16 channels: 11–26 | 5 MHz spacing; avoid Wi‑Fi overlap when possible |
Data rate | 250 kbps @ 2.4 GHz | Lower at sub‑GHz: 20/40/100 kbps |
Modulation | O-QPSK (2.4 GHz) | DSSS spread spectrum |
Range | ~10–100 m typical indoors | Depends on power, antennas, environment |
Max nodes | ~65k per PAN | 16‑bit short addressing |
Topologies | Star, Tree, Mesh | Mesh is the headline feature |
Power model | Sleepy end devices supported | Polling via parents (routers/coordinator) |
Zigbee supports several types of network topologies, including star, tree, and mesh. Among these, mesh networks are the most notable. In a mesh topology, devices can relay messages through one another, greatly extending the range and reliability of communication without relying solely on a central hub.
Star networks are simpler and center around a single coordinator, which communicates directly with end devices. Tree networks provide a hierarchical structure, where routers can also act as intermediaries between devices and the coordinator, offering a balance between coverage and efficiency.
Star Mesh [C] [R]--[R]--[R] /|\ | \ | | [E][E][E] [E] [E] [E] (C=Coordinator, R=Router, E=End Device)
Zigbee networks consist of three primary device roles:
The combination of these roles allows for flexible network configurations that can adapt to various deployment scenarios, from simple home automation systems to large-scale industrial sensor grids.
Formation (Coordinator):
Joining (Routers/End Devices):
Zigbee applies security at two key protocol layers: the MAC (Medium Access Control) layer and the APS (Application Support) layer. At the MAC layer, security relies on a Network Key (NK), which is shared by all devices within the Personal Area Network (PAN) and is used to encrypt and authenticate network-level communications. For more fine-grained and secure interactions, the APS layer uses Link Keys (LK), which are unique to each pair of devices. These keys help secure application-level messages and are also used in communication with the Trust Center—a central authority, typically the coordinator, that manages authentication and key distribution across the network.
To establish secure links, Zigbee supports install codes, which are unique per-device secrets used to derive initial link keys. These are strongly preferred over using global default keys, which are vulnerable to compromise. For improved security, best practices include disabling the use of known default keys, using install codes or other out-of-band commissioning methods, limiting the duration that the network allows new device joins (known as the permit-join window), and scheduling regular updates to the Network Key. These measures help mitigate risks from eavesdropping, spoofing, and unauthorized device access.
# Coordinator radio set channel 20 nwk set extpanid 0x1122334455667788 nwk set panid 0x1A2B sec set tc install_codes on nwk start nwk permit-join 120 # seconds # Router or End Device scan active join 0x1122334455667788 tcbinding establish # using install code or pre-shared link key