Report copyright - BLE Security - University of Michiganprabal/teaching/eecs582/slides/ble-sec-iot-6up.pdfSummary Proven link-layer encryption scheme node to node (in 4.2) No protection against MITM
Please pass captcha verification before submit form