It employs frequency-hopping spread spectrum (FHSS) over the 2.4- to 2.483-GHz spectrum, but uses 40 2-MHz-wide channels rather than the 79 1-MHz channels of classic Bluetooth. The low-energy version uses a different radio technology than the classic strain. The other strain is the low-energy Bluetooth that includes versions 4.0, 4.1, and 4.2. Two Bluetooth classes: There are essentially two strains of Bluetooth, the older legacy or classic strain that encompasses versions 1.0 through 3.0 (including EDR). Recently, I got a briefing on the new standard from Steve Hegenderfer, Director of Developer Programs of the Bluetooth SIG. Key updates to Bluetooth 5 include longer range, faster speed, and larger broadcast message capacity, as well as improved interoperability and coexistence with other wireless technologies. Last month, on December 7, the Bluetooth Special Interest Group (SIG) adopted Bluetooth 5 as the latest version of the Bluetooth core specification. Now Bluetooth is ready to add to that impressive outcome with the announcement of its latest version Bluetooth 5. Billions of radios have been made and sold. That’s why Bluetooth is the best-selling wireless technology in the world. Double what you think, since it takes two radios to communicate. These chips are in your smartphones, cars, laptops, tablets, wireless speakers, headsets, mice, keyboards, game controllers, and others. In addition, Apple added Bluetooth Classic to BLE support for devices that support the Secured Connections feature that was introduced in the Bluetooth Core Specification 4.1 (see the Bluetooth Core Specification 5.1).How many Bluetooth radios do you own? Answer: More than you probably think. For example, a link key generated with BLE can be used to derive a Bluetooth Classic link key. IOS 13 or later and iPadOS 13.1 or later have the ability to derive link keys across transports, a feature known as cross-transport key derivation. The private address is generated using the device’s identity resolving key exchanged during the pairing procedure. For a device using the privacy feature to reconnect to known devices, the device address, referred to as the private address, must be resolvable by the other device. To help secure user privacy, BLE includes the following two features: address randomization and cross-transport key derivation.Īddress randomization is a feature that reduces the ability to track a BLE device over a period of time by changing the Bluetooth device address on a frequent basis. Pairings require a user response, including all non-MITM pairing modes Two user-assisted numeric methods: numerical comparison or passkey entry Secure Simple Pairing: Protection against man-in-the-middle (MITM) attacks Secure Simple Pairing: Protection against passive eavesdroppingĮlliptic Curve Diffie-Hellman Exchange Ephemeral (ECDHE)Įlliptic Curve Diffie-Hellman Exchange (ECDHE) Pairing information stored in a secure location in iOS, iPadOS, macOS, tvOS, and watchOS devicesįIPS-approved algorithms ( HMAC-SHA256 and AES-CTR)ĪES-CCM cryptography, performed in the Controller
0 Comments
Leave a Reply. |