Since cyber hacking is more of a threat than ever, Robert dives into the Bluetooth Security Manager in Part 6 of his series on Bluetooth. Previously, he wrote about Bluetooth Low Energy protocol in Part 4, and in Part 5, he wrote on GATT for Circuit Cellar's September issue. In this issue, Robert examines attacks on confidentiality, authenticity and integrity and describes ways to combat man-in-the-middle attacks.
Welcome back to the world of Bluetooth. In my previous articles, I presented the overall Bluetooth Low Energy (BLE) protocol. I explained how a BLE connection between two devices can be established ("No Blues with Bluetooth, Part 4: Let's Connect with BLE." Circuit Cellar 409, August 2024) [1] and what kind of information can be exchanged through this connection ("No Blues with Bluetooth, Part 5: GATT explained." Circuit Cellar 410, September 2024) [2].
Do you now have all the information needed to understand BLE? Well, almost. I am sure you remember the BLE protocol stack. If not, just have a look at Figure 1. I already presented all entities on this diagram except one--the Security Manager (SM). As its name implies, it ensures that the BLE communication is "safe," that is, safe enough for a given application.
Cyber hacking is more than a risk, and Bluetooth is now used for a multitude of sensitive applications, so this topic is more than crucial. Next, let's have a look at how security is managed in BLE.
SECURITY RISKS
Before delving into the BLE Security Manager, it may be useful to go back to some security basics. Let's take the example of a door lock that's designed to be opened with your smartphone (Figure 2). For sure, many such products exist on the market. What are the cyber security risks in such a case, especially since a wireless link is used?
This story is from the {{IssueName}} edition of {{MagazineName}}.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.
Already a subscriber ? Sign In
This story is from the {{IssueName}} edition of {{MagazineName}}.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.
Already a subscriber? Sign In
Renesas New RA8 Entry-Line MCU Groups Brings High Performance of Arm Cortex-M85 Processor to Cost-Sensitive Applications with Market-Leading CoreMark Performance
Renesas Electronics Corp., a premier supplier of advanced semiconductor solutions, introduced the RA8E1 and RA8E2 microcontroller (MCU) groups, extending the industry's most powerful series of MCUs.
Same Sky Expands AMT Absolute Encoder Line to Support Larger Shaft Sizes
Same Sky's Motion & Control Group announced the addition of a new series to its innovative AMT absolute encoder family designed to support larger motor shaft sizes from 9mm to 15.875mm (5/8 inch).
XP Power Launches New Series of Low-Profile, Baseplate-Cooled DC-DC Brick Converters
The RDF150 and RDF200 series are the latest additions to the RDF series of low-profile, baseplate-cooled, ultra-wide input DC-DC brick converters, which is already available in power outputs of 25W and 50W.
HMI Introduces Ultra-Low Voltage 12-bit GPIO Expander with Interrupt Output
HMI, a leading provider of advanced analog and power management technologies, announced the launch of its HL5310, an innovative ultra-low voltage 12-bit GPIO expander featuring interrupt output.
The Future of Embedded Chip Design Navigating the Chip Creation Space
Custom Silicon at Lower Cost, Reduced Development Time
The Long and Winding Road
From Maxim's RS-232 to WeMos ESP32: So Much to Do, So Little Time
Start to Finish Driving LCDs
Lumex Display with Microchip Driver for a TI MCU
Easing the Path for App Releases
Managed Development of React Native with Expo
Datasheet: Tiny Embedded Boards
Deliver Power, Performance, and Versatility in Meager Square Millimeters
Harvesting Ambient Energy
Hybrid Power Sources Cut IoT Battery Dependency