
-2- v7.0
Document version: v7.0 - 02/2017
© Libelium Comunicaciones Distribuidas S.L.
Index
INDEX
1. Introduction......................................................................................................................................... 3
2. Integrity................................................................................................................................................ 6
2.1. Waspmote Libraries ....................................................................................................................................................................6
2.1.1. Waspmote Hash Files .................................................................................................................................................6
2.1.2. Constructor ....................................................................................................................................................................6
2.1.3. Pre-Dened Constants ...............................................................................................................................................6
2.2. Calculating Message Digest.....................................................................................................................................................7
2.2.1. Calculating MD5 hash.................................................................................................................................................7
2.2.2. Calculating SHA hash .................................................................................................................................................7
2.3. Printing Message..........................................................................................................................................................................8
3. Authenticity ......................................................................................................................................... 9
3.1. Waspmote Libraries .................................................................................................................................................................10
3.1.1. Waspmote RSA Files .................................................................................................................................................10
3.1.2. Constructor ..................................................................................................................................................................10
3.1.3. Pre-Dened Constants .............................................................................................................................................10
3.2. Encrypting Message.................................................................................................................................................................10
4. Condentiality (privacy) ................................................................................................................... 11
4.1. Waspmote Libraries .................................................................................................................................................................13
4.1.1. Waspmote AES Files .................................................................................................................................................13
4.1.2. Constructor ..................................................................................................................................................................13
4.1.3. Pre-Dened Constants .............................................................................................................................................13
4.2. Calculating the encrypted message length...................................................................................................................13
4.3. AES Encryption .........................................................................................................................................................................13
4.4. Printing Message.......................................................................................................................................................................14
5. Secure Communication Scheme....................................................................................................... 15
6. Key Management on Meshlium........................................................................................................ 16
6.1. Link layer key Management (only XBee) ..........................................................................................................................16
6.2. Application Layer Key Management (AES libraries) .....................................................................................................18
7. Code examples and extended information .................................................................................... 20
8. API changelog.................................................................................................................................... 22
9. Certications...................................................................................................................................... 23