![]() Once the two devices are connected, they will perform a “pairing” process where they will exchange the information necessary to establish an encrypted connection. The GAP Central is typically the device which initiates the connection with the GAP Peripheral. The GAP Observer and GAP Broadcaster roles are typically used in applications with little to no security requirements and are thus not considered in this article.įor readers unfamiliar with the BLE standard, GAP is the layer of the BLE stack which determines the network topology of the BLE system. This article will focus on the BLE GAP (Generic Access Profile) Central and GAP Peripheral roles. This article seeks to give a basic overview of these features as well as give some insight into the theory behind them. Thus, designers looking to integrate BLE into their products should be aware of the security features and limitations of this technology. Likewise, it is also becoming more commonly used in applications where sensitive information is being transferred. Created by Matthew Bon, last modified on Introduction:īluetooth Low Energy (BLE), is rapidly becoming one of the most common wireless standards in use today. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |