- Building Bluetooth Low Energy Systems
- Muhammad Usama bin Aftab
- 128字
- 2021-07-09 18:24:54
Bluetooth Low Energy Security
Bluetooth Low Energy provides five features for its security including pairing, bonding, encryption, authentication and message integrity. These satisfy three pillars of security which are Authentication, Confidentiality, and Authorization. Attacks against improperly secured Bluetooth implementation can provide hackers with unauthorized access to the sensitive information and unauthorized use of the Bluetooth device. The main security features in Bluetooth Low Energy are:
- Pairing is the process of generating shared keys (on both ends) known as Short Term Key (STK)
- Bonding is the subsequent process of pairing where they store the STK in order to form a trusted pair
- Device authentication is when two devices identify if they have same keys
- Encryption is for message confidentiality
- Message integrity is to avoid attackers to forge the data
推薦閱讀
- Arduino入門基礎教程
- 深入淺出SSD:固態存儲核心技術、原理與實戰
- 電腦組裝、維護、維修全能一本通(全彩版)
- 從零開始學51單片機C語言
- 計算機維修與維護技術速成
- Mastering Adobe Photoshop Elements
- R Deep Learning Essentials
- Creating Flat Design Websites
- Hands-On Artificial Intelligence for Banking
- Wireframing Essentials
- 觸摸屏應用技術從入門到精通
- Building Machine Learning Systems with Python
- Instant Website Touch Integration
- 嵌入式系統設計大學教程(第2版)
- 基于S5PV210處理器的嵌入式開發完全攻略