This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

How to avoid MITM attacks?

Hi,

I need protection against the MITM attack, what should I modify in heart rate example? Actually, I change the characteristics to BLE_GAP_CONN_SEC_MODE_SET_ENC_NO_MITM() and I use the sniffer to listen the transfer data, the result I read is garbled code,is it normal behaviour? These garbled code can be decoding by the attackers? I also change the characteristics of BLE_GAP_CONN_SEC_MODE_SET_ENC_WITH_MITM(). Unfortunately, the result of MCP shows "Insufficient Authentication", how do I test this function? Do you have any example related to MITM?

Thank you.

Related