BLE v4.2: Creating Faster, More Secure, Power-Efficient Designs—Part 4 (.PDF Download)

Dec. 14, 2016

In Part 3 of this series, we discussed security requirements in wireless systems. Part 4 explores the pairing process used to establish an environment for the secure transmission of data. Pairing is the process of key exchange and authentication...

Register or Sign in below to download the full article in .PDF format, including high-resolution graphics and schematics when applicable.

Sponsored

The advent of USB Type-C marked a turning point in connectivity. This compact, reversible connector has transformed the way we exchange data and power our devices, offering accelerated...
The Same Sky interconnect group carries a comprehensive line of connectors to reduce the burden on the design engineer. Their wide selection of mechanical configurations and simple...
Explore ADAM, an advanced AMR demo by Analog Devices, featuring precision depth sensing, AI mapping, 4-wheel motor control, ROS support, and smart battery & comms. Boost safety...
In a generic electronic system there are some inputs that are controlled by the end user. These inputs are read by electronics and acted upon by using outputs.