BLE security – Security platform for modern IoT devices
1. Why is security necessary in BLE?
2. Security mode & Security Procedure in BLE
3. Authentication, encryption and delegation
4. Example – BLESA Attacks
5. Project on nRF52/nRF5340
6. Conclusion
1. Why is security necessary in BLE?
The widespread adoption of...
Sleep Current of XIAO nRF52840
1. Introduction
2. Sleep current in practice
2.1. Measuring tool
2.2. Understanding sleep currents correctly
3. Conclusion
1. Introduction
In IoT systems and battery-powered devices, microcontrollers spend most of their time in a dormant state, so sleep current –...
Analyzing Bluetooth Low Energy Data Transfer Speed Across PHY Modes with an IoT Demo
1. Introduction to Bluetooth Low Energy Data Transfer Speed
2. Speed in PHY modes
3. BLE Data Transfer Speed Demo Using an IoT Project
4. Conclusion and Futute Improvements for BLE Data Transfer
1. Introduction to Bluetooth Low Energy Data Transfer Speed
Welcome to...




