<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Detect / prevent the use of range extenders?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/26625/detect-prevent-the-use-of-range-extenders</link><description>Is there any way to detect / prevent the use of range extenders? 
 When using a central &amp;amp; server with low TX power, the range is say 10m.
Now an attacker can use a relay where central &amp;amp; client unknowingly connect to and thus increasing the range. For</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 14 Nov 2017 15:09:41 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/26625/detect-prevent-the-use-of-range-extenders" /><item><title>RE: Detect / prevent the use of range extenders?</title><link>https://devzone.nordicsemi.com/thread/104753?ContentTypeID=1</link><pubDate>Tue, 14 Nov 2017 15:09:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:dbcc1bb4-d801-4520-9f0b-d6a4c80d214f</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;I see. It is difficult to protect against such attacks when no user action is required to &amp;quot;open&amp;quot; the door, just proximity.&lt;/p&gt;
&lt;p&gt;The minimum connection interval is 7.5 ms, so if a central does a read it would typically receive a response in a bit more than 7.5 ms, but by spec it can be up to 30 seconds before the transaction times out.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Detect / prevent the use of range extenders?</title><link>https://devzone.nordicsemi.com/thread/104752?ContentTypeID=1</link><pubDate>Tue, 07 Nov 2017 13:37:48 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8cabc5e4-68bd-4a92-b6d3-c493c21577eb</guid><dc:creator>JB21</dc:creator><description>&lt;p&gt;It&amp;#39;s an access control system. That should only work within say 10 meters.
Similar to touchless keys used by cars. And there criminals have used 2 extender units, one near the car the other near the owner with his key who sleeps in a hotel. Quite easy to open a car.&lt;/p&gt;
&lt;p&gt;No, I&amp;#39;m not that worried about unauthenticated devices trying to connect. It has been taken care of.&lt;/p&gt;
&lt;p&gt;Assume the central uses the shortest connection interval and does a characteristic read, then it should get a reply just an interval later (2.5 ms), right. Can one rely on that?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Detect / prevent the use of range extenders?</title><link>https://devzone.nordicsemi.com/thread/104751?ContentTypeID=1</link><pubDate>Tue, 07 Nov 2017 12:09:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1b8d0e81-eb98-4ce2-aa18-a84314b0cda8</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;Not that I&amp;#39;m aware. What kind of application is this? Could you elaborate? You are not worried that unauthenticated devices can connect? You are only worries about relay attacks?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>