Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×

Z-Wave Alliance Adds Security Requirements

The Z-Wave Alliance is adding a security requirement to its long-standing interoperability certification.

The Z-Wave Alliance is adding a security requirement to its long-standing interoperability certification. This is an important addition to its certification program that will require manufacturers to adopt the strongest levels of IoT security in the industry. 

The Alliance board of directors voted to make the implementation of the new Security 2 (S2) framework mandatory for all products that are Z-Wave certified after April 2, 2017. The security measures in S2 provide the most advanced security for smart home devices and controllers, gateways, and hubs in the market today. 

The Z-Wave Alliance, along with its board of directors and members, has been working for the past several years to develop world-class security for its devices as the IoT expands in the U.S. and across the globe. A 2016 survey by Intel Security showed that two-thirds of consumers are worried about cybersecurity of connected devices, and recent incidents involving popular brands demonstrates the real need for industry leadership.

“This recent decision to make the S2 framework mandatory on all Z-Wave-certified devices stems from a growing need for industry leadership in the smart home space to take the security and privacy of devices in the market seriously,” said Mitchell Klein, executive director of the Z-Wave Alliance. “No one can afford to sit on their hands and wait—consumers deserve IoT devices in their home to have the strongest levels of security possible. IoT smart home technologies that don’t act will be left behind.”

Z-Wave’s S2 framework was developed in conjunction with cybersecurity hacking experts, giving the already secure Z-Wave devices higher levels of impenetrability. By securing communication both locally for home-based devices and in the hub or gateway for cloud functions, S2 also completely removes the risk of devices being hacked while they are included in the network, according to the company.

By using a QR or pin-code on the device itself, the devices are uniquely authenticated to the network as well. Common hacks such as man in the middle and brute force are virtually powerless against the S2 framework through the implementation of the industry-wide accepted secure key exchange using Elliptic Curve Diffie-Hellman (ECDH). Finally, Z-Wave also strengthened its cloud communication, enabling the tunneling of all Z-Wave-over-IP (Z/IP) traffic through a secure TLS 1.1 tunnel, removing vulnerability.

The changes to Z-Wave’s technical certification program, which is administered through third-party test facilities in Europe, U.S., and Asia, first established to test and certify Z-Wave devices in 2005 will check that all S2 security solutions, which contain rules for command classes, timers, and device types are correctly implemented.

Close