BLE Connection by verifying thr enryption using ECDH

hello everyone,

I have a task to establish the connection between the BLE peripheral and mobile application after verifying the encryption by exchanging the public key of the peripheral and mobile application using the ECDH algorithm. 

is it possible to exchange the keys before the connection and verify the security? if possible kindly suggest to me which example should I use. Kindly give me an idea on this.

Regards,

Srinivasa

Related