BLE security – Security platform for modern IoT devices
1. Why is security necessary in BLE?
2. Security mode & Security Procedure in BLE
3. Authentication, encryption and delegation
4. Example – BLESA Attacks
5. Project on nRF52/nRF5340
6. Conclusion
1. Why is security necessary in BLE?
The widespread adoption of...
Sleep Current of XIAO nRF52840
1. Introduction
2. Sleep current in practice
2.1. Measuring tool
2.2. Understanding sleep currents correctly
3. Conclusion
1. Introduction
In IoT systems and battery-powered devices, microcontrollers spend most of their time in a dormant state, so sleep current –...
Bluetooth Low Energy Data Transfer Speed
1. Introduction
2. Speed in PHY modes
3. Demo project using Bluetooth in IoT
4. Conclusion
1. Introduction
Welcome to Industrial Embedded Solutions – where we deliver modern, reliable, and optimized industrial embedded solutions for real-world challenges in...




