Bluetooth mesh networking: Difference between revisions

Content deleted Content added
No edit summary
Time to live reference
Line 21:
Each message is encrypted and authenticated. Two keys are used to secure messages: (1) network keys – allocated to a single mesh network, (2) application keys – specific for a given application functionality, e.g. turning the light on vs reconfiguring the light.
 
Messages have a [[Time to live|time to live]] (TTL). Each time message is received and retransmitted, TTL is decremented which limits the number of "hops", eliminating endless loops.
 
Bluetooth Mesh is a [[Flooding (computer networking)|flood network]]. It's based on the nodes relaying the messages: every relay node that receives a network packet that authenticates against a known network key that is not in message cache, that has a TTL ≥ 2 can be retransmitted with TTL = TTL - 1.