<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Vulnerability Assessment and Penetration Testing for BLE devices</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/55946/vulnerability-assessment-and-penetration-testing-for-ble-devices</link><description>I had an interesting call with the IT security team of a large Fortune 100 company. During our conversation they asked a few questions and I was wondering if someone from Nordic Dev Support can help with the answers 
 
 1. Is BLE recommended for Industry</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 02 Jan 2020 08:51:30 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/55946/vulnerability-assessment-and-penetration-testing-for-ble-devices" /><item><title>RE: Vulnerability Assessment and Penetration Testing for BLE devices</title><link>https://devzone.nordicsemi.com/thread/227195?ContentTypeID=1</link><pubDate>Thu, 02 Jan 2020 08:51:30 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3e1449cf-fe4b-455c-a8f6-ceaf71f5fc25</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Hi Riyaz,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Apologies for the late reply, we&amp;#39;re a bit short staffed during the holidays.&amp;nbsp;&lt;/p&gt;
[quote user=""]1. Is BLE recommended for Industry 4.0 best practices? If yes, is it documented somewhere?[/quote]
&lt;p&gt;&amp;nbsp;Yes,&amp;nbsp; Bluetooth 5.0 and Bluetooth Mesh allows for more robust connections, longer range as well as the possibility of connecting thousands of BLE devices in mesh networks for large scale sensor data acquisition and control applicaitons.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://ieeexplore.ieee.org/document/8869211"&gt;https://ieeexplore.ieee.org/document/8869211&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.bluetooth.com/news/bluetooth-5-and-bluetooth-mesh-enabling-use-cases-for-industry-4-0/"&gt;https://www.bluetooth.com/news/bluetooth-5-and-bluetooth-mesh-enabling-use-cases-for-industry-4-0/&lt;/a&gt;&lt;/p&gt;
[quote user=""]2. Is the Bluetooth Network Penetrable?&amp;nbsp;[/quote]
&lt;p&gt;&amp;nbsp;Bluetooth Low Energy uses AES-128 encryption with a key size up to 16-bytes, which is adopted by the U.S. government and is now used worldwide.&lt;/p&gt;
&lt;p&gt;Since Bluetooth 4.2 its possible to use LE Secure connections which employs the Diffie-Hellmann Key exchange to securely exchange encryption keys with out risking man-in-the-middle attacks, see&amp;nbsp;&lt;a href="https://www.bluetooth.com/blog/bluetooth-pairing-part-4/"&gt;https://www.bluetooth.com/blog/bluetooth-pairing-part-4/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Using a 16-byte key size in addition to LE Secure Connections it will not be possible for an attacker to decrypt the transmitted data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Bluetooth Special Interest Group will release Security notices for any known vulnerabilities and their fixes, see&amp;nbsp;&lt;a href="https://www.bluetooth.com/security/"&gt;https://www.bluetooth.com/security/&lt;/a&gt;&lt;/p&gt;
[quote user=""]3. Do we have a VAPT (Vulnerability Assessment and Penetration Testing) report from any Industry who has implemented BLE?[/quote]
&lt;p&gt;&amp;nbsp;I am afraid we do not have any VAPT report, nor am I aware of any reports from industry.&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Bjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>