This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Which method is recommend for BLE security?

Hi,

I am wondering which is the best method for BLE security to avoid MITM, protect the data (sniffers) and limit connection only to allowed devices for a massive number of BLE devices, example 500 > random and new devices.

Peer manager is the recommend for this task? or something like Application-level Security Using the ECB Peripheral?

devzone.nordicsemi.com/.../

info: NRF52 and SDK13

Regards, Marco

Parents
  • Hey, Petter thanks for answering, now it is a little clearer and easier to take the route to follow. Last two quick questions. In the case the LESC parting with Just Works, it protects against eavesdropping, does not it make harder a MITM attack?

    I ask it because I had done reverse engineering to BLE devices in the past using a sniffer.

    Second question any example with LESC in nRF5 SDK?

Reply
  • Hey, Petter thanks for answering, now it is a little clearer and easier to take the route to follow. Last two quick questions. In the case the LESC parting with Just Works, it protects against eavesdropping, does not it make harder a MITM attack?

    I ask it because I had done reverse engineering to BLE devices in the past using a sniffer.

    Second question any example with LESC in nRF5 SDK?

Children
No Data
Related