6.7 Bluetooth Security

Legacy Pairing vs. LE Secure Connections

Pairing is the process of creating a trusted relationship between two devices by generating and storing shared secret keys.

Encryption, Privacy, and MITM Protection

Modern Bluetooth security is built on three core pillars:

  1. Encryption (Confidentiality): Once devices are paired, the connection can be encrypted. Bluetooth uses the AES-CCM algorithm to encrypt all data sent over the link. This ensures that if an attacker were to listen to the radio traffic, they would only see unintelligible encrypted data, not the actual information.

  2. Privacy (Anti-Tracking): To prevent malicious actors from tracking a user by listening for their device's Bluetooth address, BLE uses Resolvable Private Addresses (RPAs). A device with this feature enabled will periodically change its public Bluetooth address to a new, randomized one. Only devices that have previously paired with it possess the key (the IRK - Identity Resolving Key) needed to resolve this random address and identify the device.

  3. Authentication and MITM Protection: A Man-in-the-Middle (MITM) attack occurs when an attacker secretly sits between two devices and relays their communication, potentially altering it. LE Secure Connections protects against this by authenticating the connection during pairing. This is done using one of several association models:

    • Passkey Entry: The user enters a 6-digit number on both devices.

    • Numeric Comparison: A 6-digit number is displayed on both devices, and the user confirms they are the same. This is the most common method for devices with displays.

    • If a connection is authenticated, the devices have proven they are communicating directly with each other and not an imposter.

Security Best Practices for Developers

For students building Bluetooth applications, security should be a primary concern.


Revision #1
Created 2025-08-28 11:53:00 UTC by GI
Updated 2025-08-28 12:19:33 UTC by GI