This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Which method is recommend for BLE security?

Hi,

I am wondering which is the best method for BLE security to avoid MITM, protect the data (sniffers) and limit connection only to allowed devices for a massive number of BLE devices, example 500 > random and new devices.

Peer manager is the recommend for this task? or something like Application-level Security Using the ECB Peripheral?

devzone.nordicsemi.com/.../

info: NRF52 and SDK13

Regards, Marco

Parents
  • I am using multiples peripherals to record temperature variations and two central to connect to each peripheral (one per time not multiple connections), The only input for my modules is the temperature sensor, and for my central the only input is the data coming from the peripheral over BLE, I suppose it supports LESC because I am using central and peripheral roles using the SDK13. I would like to protect my devices from malicious attacks and try to keep them as safe as possible. Is not eavesdropping the same that sniffing? or similar to MITM? is there any example or guideline to add peer manager to my devices?

Reply
  • I am using multiples peripherals to record temperature variations and two central to connect to each peripheral (one per time not multiple connections), The only input for my modules is the temperature sensor, and for my central the only input is the data coming from the peripheral over BLE, I suppose it supports LESC because I am using central and peripheral roles using the SDK13. I would like to protect my devices from malicious attacks and try to keep them as safe as possible. Is not eavesdropping the same that sniffing? or similar to MITM? is there any example or guideline to add peer manager to my devices?

Children
No Data
Related