Skip to main content

Week 4 — BLE Security & Pairing Models

BLE security failures often happen during pairing, not data transfer.


1. BLE Security Basics

BLE security includes:

  • Pairing
  • Bonding
  • Encryption
  • Authentication

2. BLE Pairing Methods

MethodSecurity Level
Just WorksLow
PasskeyMedium
Numeric ComparisonHigh
Out-of-bandHighest

3. BLE Threats

  • Passive eavesdropping
  • Active MITM during pairing
  • Unauthorized device bonding

4. Best Practices

  • Avoid Just Works for sensitive devices
  • Use LE Secure Connections
  • Restrict bonding

Week 4 Takeaway

BLE security is strongest when user interaction validates trust.