Bluetooth mesh networking: Difference between revisions

Content deleted Content added
Undid revision 962191431 by 2404:0:8221:FB99:0:31:99A9:8F01 (talk) - rv unexplained removal of information.
ieee ref: restore url - no need to go force the reader to go through doi.org, which is not guaranteed to always be online, when the direct url is available
Line 131:
A key unique to a device known as "Device Key" is derived from elliptic curve shared secret on provisioner and device during the provisioning process. This device key is used by the provisioner to encrypt messages for that specific device.
 
Security of provisioning process has been analyzed in a paper presented during [[IEEE Communications Society|IEEE CNS]] 2018 conference.<ref>{{Cite journal|last=Adomnicai|first=A.|last2=Fournier|first2=J. J. A.|last3=Masson|first3=L.|date=2018-05-30|title=Hardware Security Threats Against Bluetooth Mesh Networks|journal=2018 IEEE Conference on Communications and Network Security (CNS)|volume=|pages=1–9|url=https://ieeexplore.ieee.org/document/8433184|doi=10.1109/CNS.2018.8433184|isbn=978-1-5386-4586-4}}</ref>
 
The provisioning can be performed using a Bluetooth GATT connection or advertising using the specific bearer.<ref name=":0" />