BLE v4.2: Creating Faster, More Secure, Power-Efficient Designs—Part 4 (.PDF Download)
Dec. 14, 2016
In Part 3 of this series, we discussed security requirements in wireless systems. Part 4 explores the pairing process used to establish an environment for the secure transmission of data. Pairing is the process of key exchange and authentication...
Register or Sign in below to download the full article in .PDF format, including high-resolution graphics and schematics when applicable.