This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

How does a legacy device become member of and communicate securely with the Bluetooth mesh network?

Hi,

In the Getting Started guide of the Bluetooth Mesh SDK it is stated that legacy non-mesh devices can communicate with the mesh via a proxy mesh device through tunneling and also that mesh security also applies to that communication part. But I'm wonder how the mesh security is implemented there? Does the non-mesh device also encrypt his messages with the network key and used application key for that message? If so, does the non-mesh device store that network key and associated application keys in the same way as a mesh device? Or thus can the non-mesh device also work with models and thus implement models in the same way a mesh device does but just can't communicate over the same kind of bearer? Or is their something else at work here? Does the Proxy Protocol have its own security ways or such? Some clarifications would be very helpful :)

Thanks in advance!

Kind regards,

Mathias

Related