O'Reilly logo

Bluetooth Low Energy: The Developer’s Handbook by Robin Heydon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Security

There are two types of encryption: one that will prevent your sister from reading your diary, and one that will prevent your government.

—Bruce Schneier

11.1. Security Concepts

Security is a complex subject that for many people is just a black box. If the technology is secure, that is enough for lots of people. However, there are many things about security that need to be understood in the context of Bluetooth low energy. These include the following topics:

• Authentication

• Authorization

• Integrity

• Confidentiality

• Privacy

11.1.1. Authentication

Authentication is defined as a way to prove that the device with which you are connecting is actually the device it claims to be and not a third-party attacker. This is done ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required