Report - BLE Security - University of Michiganprabal/teaching/eecs582/slides/ble-sec-iot-6up.pdfSummary Proven link-layer encryption scheme node to node (in 4.2) No protection against MITM

Please pass captcha verification before submit form