<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>what are the methods to secure peripheral device over ble?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/27645/what-are-the-methods-to-secure-peripheral-device-over-ble</link><description>I&amp;#39;m using nrf52832 in my peripheral device, I want to secure its connection via any authentication is there any method for that?, also I need to encrypt its data(characteristics).</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 28 Nov 2017 13:10:31 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/27645/what-are-the-methods-to-secure-peripheral-device-over-ble" /><item><title>RE: what are the methods to secure peripheral device over ble?</title><link>https://devzone.nordicsemi.com/thread/109155?ContentTypeID=1</link><pubDate>Tue, 28 Nov 2017 13:10:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7e13f4f1-e099-471d-9d70-1cca0a115a01</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;In BLE there is Security Manager layer as the only one standard procedure. It has several modes depending on standard and Input/Output methods support on both devices while only some of these are completely safe against well known attacks. However for your use case it should be enough, please read about BLE pairing and bonding mechanisms on any BLE introduction/tutorial which will pop up in Google search (e.g. &lt;a href="http://microchipdeveloper.com/wireless:ble-gap-security"&gt;microchipdeveloper.com/wireless:ble-gap-security&lt;/a&gt; )&lt;/p&gt;
&lt;p&gt;The other method (e.g. in case BLE Security Manager layer pairing/bonding concept doesn&amp;#39;t fit your use cases) is custom security scheme on APP layer. Here is one example how this could work (but surely there are many many more ways): &lt;a href="https://devzone.nordicsemi.com/blogs/1068/simple-application-level-authentication/"&gt;devzone.nordicsemi.com/.../&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>