This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Support required for validation of BLE Profiles, Protocols and Encryption process

Hi,

I am using Nordic boards for one of my clients in some Project.. The client wanted to make sure from logs and Traces that commitment we are making for the Encryption and Protocols level is end to end secured. I tried showing him the Packets from Wireshark but he is not convinced with that. Client wanted to know and explore more about following things at packet  and Protocol Level.

1. LE Baseband 

2. LE Encryption

3. LE LL

4. LE Packets

5. LE Advertisement Packets Details

Thanks,

Aditya Jadoun


Parents
  • I think the overall question here is; how secure is BLE?

    I think this answer is way too big to be answered in a devzone thread, I suggest to look at third party discussions on BLE security. Typically BT SIG will address any security weakness identified, and by supporting DFU you can then update the firmware if your product are impacted by the weakness. From my knowledge the _only_ weakness in BLE is if a potential attacker is listening-in or act as a MITM during the initial bonding procedure when the encryption keys are generated. 

Reply
  • I think the overall question here is; how secure is BLE?

    I think this answer is way too big to be answered in a devzone thread, I suggest to look at third party discussions on BLE security. Typically BT SIG will address any security weakness identified, and by supporting DFU you can then update the firmware if your product are impacted by the weakness. From my knowledge the _only_ weakness in BLE is if a potential attacker is listening-in or act as a MITM during the initial bonding procedure when the encryption keys are generated. 

Children
No Data
Related