In Bluetooth LE (BLE), security is a multifaceted beast. Learn the three main security modes of BLE, along with five critical BLE security procedures.
5 days ago by Nthatisi Hlapisi
Pairing is an important concept in Bluetooth LE. Let’s examine the fundamentals of Bluetooth LE pairing, outlining how LE devices securely share keys between trusted devices.
September 10, 2023 by Nthatisi Hlapisi
Learn the roles of the three security keys in Bluetooth LE—Long Term Key (LTK), Connection Signature Resolving Key (CSRK), and Identity Resolving Key (IRK).
August 13, 2023 by Nthatisi Hlapisi
Learn about Bluetooth LE's security features and tools, how to use them, and understand how they keep connections secure.
June 23, 2023 by Nthatisi Hlapisi
In this article, we’ll discuss the PUF or physically unclonable function and how it boosts hardware security in ICs.
June 14, 2021 by Jake Hertz
Don't have an AAC account? Create one now.
Forgot your password? Click here.