Changeable-type network variables, 68 d – Echelon Neuron C User Manual

Page 80

Advertising
background image

68

How Devices Communicate Using Network Variables

4

Device B compares its computed transformation with the number it

receives from Device A. If the two numbers match, the identity of the
sender is verified, and Device B can perform the requested action and

send its acknowledgment to Device A. If the two numbers do not match,

Device B does not perform the requested action and an error is logged in
the error table.

If the acknowledgment is lost and Device A tries to send the same message again,
Device B remembers that the authentication was successfully completed, and

acknowledges it again.

Device B

(reader)

1

2

3

4

ACKD Message or

Request

Challenge

Reply to challenge

ACK or Response

Device A

(Writer)

Figure 8. Authentication Process

If Device A attempts to update an output network variable connected to multiple
readers, each receiver device generates a different 64-bit random number and

sends it in a challenge packet to Device A. Device A must then transform each of
these numbers and send a reply to each receiver device.
The principal strength of authentication is that it cannot be defeated by simple
record and playback of commands that implement the desired functions (for

example, unlocking the lock). Authentication does not require that the specific

messages and commands be secret, because they are sent unencrypted over the
network, and anyone who is determined can read those messages.
It is good practice to connect a device directly to a network tool with no other

devices on the same network when installing its authentication key the first
time. This prevents the key from being sent over a large network where an

intruder might detect it. Once a device has its authentication key, a network tool

can modify the key, over the network, by sending an increment to be added to the
existing key.
Alternatively, your development tool might support exporting your device’s
application image in a pre-configured state including your initial authentication

key. See your development tool’s documentation for information about exporting

pre-configured application images.

Changeable-Type Network Variables

You can create network variables that support their type and size being changed

during installation. This kind of network variable is called a

changeable-type

network variable

.

Advertising