WIKA PEW-1 Serie Manual De Instrucciones página 12

Idiomas disponibles

Idiomas disponibles

3. Safety
3.8 Data transfer security
3.8.1 LoRaWAN
®
®
LoRaWAN
security uses the cryptographic principle of AES cryptography in combination with several operating
EN
modes: CMAC2 for integrity protection and CTR3 for encryption. Each LoRaWAN
unique 128-bit AES key (AppKey) and a globally unique identifier (EUI-64-based DevEUI), both used during the device
authentication process.
→ Further details can be found in the official LoRaWAN
https://lora-alliance.org
3.8.2 Bluetooth
®
®
Bluetooth
Low Energy communicates in the licence-free 2.4 GHz ISM band and is a globally harmonised energy-
efficient radio standard. Bluetooth
performed using the AES 128 encryption algorithm in combination with distributed key replacement.
The sensors of the model PEW-1xxx transmit the pressure and temperature value as an optional broadcast message
on the advertising channels 37, 38 and 39, in addition to the instrument name and the battery charge status. Further
information and detailed configuration and command options are available via a point-to-point connection.
Pairing is established using a passkey entry method and requires the entry of a security code. Instrument
settings can only be accessed after pairing has been completed. The pairing key for each instrument is
random. The initial pairing key can be found on the enclosed quick start guide.
If the security code is entered incorrectly 5 times, the instrument is blocked for connection with this code.
After disconnecting the voltage supply or removing the battery, 5 attempts are once again available. If this
is not possible for technical reasons, e.g. because the sensor cannot be reached to open the case, contact
technical support.
12
Low Energy
®
Low Energy uses 40 channels between 2.402 GHz and 2.480 GHz. Encryption is
®
Security White Paper from the LoRa Alliance
WIKA operating instructions, models PEW-1000 and PEW-1200
®
device is personalised with a
®
, see
loading