This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

BLE just works pairing

Hi,

I am working over nrf51822 ble and I have some security issues with that. I'm programming an android app to connect to the nRF51822 (peripheral). Without any security or pairing settings everything works fine. The Problem: Any kind of authentication and encryption is needed, but in the final Product the nRF51822 has no display or keyboard.

I want to work with "just works" security model so that no sniffing or eavesdropping would interference. please suggest me some material where I can good enough knowledge and can work with my ble device. Any help will be appreciated.

Parents
  • Hi,

    I would recommend that you read this three-part blog post at bluetooth.com about Bluetooth Pairing: Part 1 - Part 2 - Part 3.

    For adding pairing and bonding to the nRF51, I recommend that you use the Peer Manager library. The required security parameters for implementing Just Works bonding is described here. Message Sequence Charts showing the process of Just Works pairing and bonding can be found here. Many of the examples in the SDK use Peer Manger for bonding. You might get some inspiration from the HID Keyboard Application example.

    [EDIT]: Notice that (Legacy) Just Works does not provide any protection against Man-in-the-Middle (MITM) attacks or Passive Eavesdropping during pairing.

    Hope this helps to get you started!

    Best regards,

    Jørgen

Reply
  • Hi,

    I would recommend that you read this three-part blog post at bluetooth.com about Bluetooth Pairing: Part 1 - Part 2 - Part 3.

    For adding pairing and bonding to the nRF51, I recommend that you use the Peer Manager library. The required security parameters for implementing Just Works bonding is described here. Message Sequence Charts showing the process of Just Works pairing and bonding can be found here. Many of the examples in the SDK use Peer Manger for bonding. You might get some inspiration from the HID Keyboard Application example.

    [EDIT]: Notice that (Legacy) Just Works does not provide any protection against Man-in-the-Middle (MITM) attacks or Passive Eavesdropping during pairing.

    Hope this helps to get you started!

    Best regards,

    Jørgen

Children
Related