Bonding

<\/script>\n
'; }, get iframeSnippet() { const domain = '{ SITE_DOMAIN }'; const type = '{ embed_type }'; const slug = '{ embed_slug }'; return ''; }, get activeSnippet() { return this.method === 'script' ? this.scriptSnippet : this.iframeSnippet; }, copySnippet() { navigator.clipboard.writeText(this.activeSnippet).then(() => { this.copied = true; setTimeout(() => { this.copied = false; }, 2000); }); } }" @keydown.escape.window="open = false" @click.outside="open = false">

Embed This Widget

Theme


      
    

Widget powered by . Free, no account required.

Storing pairing keys persistently so two BLE devices can reconnect securely without re-pairing.

다른 명칭: BLE Bonding

What Is BLE Bonding?

Bonding is the process of persisting the encryption keys generated during pairing into non-volatile storage so that two BLE devices can reconnect securely in the future without repeating the pairing procedure. A bonded relationship is essentially a "remembered" pairing.

What Gets Stored

After a successful pairing with bonding enabled, each device stores several keys:

  • LTK -- the Long Term Key used to encrypt future connections.
  • IRK -- the Identity Resolving Key, used to resolve Resolvable Private Addresses and identify the peer.
  • EDIV + Rand -- diversifiers that help locate the correct LTK during reconnection (Legacy Pairing only).
  • CCCD state -- per-client ATT">GATT & ATT">notification/indication subscription preferences.
  • Peer address -- the identity address (public or static random) of the bonded device.

Bonding vs. Pairing

The terms are often confused. Pairing is the real-time key-exchange procedure. Bonding is the decision to store those keys persistently. A device can pair without bonding (keys discarded after disconnection) or pair with bonding (keys saved). The SMP feature exchange includes a "Bonding Flags" field where each device indicates whether it wants to bond.

Reconnection Flow

When a bonded device reconnects, the central sends an LE Start Encryption request referencing the stored LTK. The peripheral's SMP looks up the LTK by the peer's identity and responds. If successful, the link is encrypted within a single connection event, typically adding less than 10 ms of overhead. This is dramatically faster than full pairing, which can take several seconds.

Bond Storage Limits

Embedded BLE SoCs have finite flash storage for bond records. Common limits range from 8 to 20 bonds. When storage is full, the device must either reject new pairings or evict the oldest bond (Least Recently Used policy). Firmware should implement a clear-bonds mechanism (e.g., holding a button for 10 seconds) and handle the "bond database full" event gracefully.

Cross-Transport Bonding

Bluetooth 4.2 introduced Cross-Transport Key Derivation (CTKD), allowing a device that bonds over BLE to derive keys for Bluetooth Classic and vice versa, avoiding the need to pair separately on each transport. This is particularly useful for dual-mode peripherals such as wireless earbuds that use Classic for audio streaming and BLE for control.

Common Issues

Bond corruption is a frequent field issue. If one device clears its bond database (e.g., after a factory reset) but the other retains the old keys, reconnection fails silently because the LTKs no longer match. The symptom is an encryption setup failure after connection. Mobile platforms handle this differently: iOS prompts the user to re-pair, while Android often requires the user to manually "Forget" the device in Bluetooth settings.

Related Terms

Understanding BLE Architecture: Protocol Stack Overview

Getting Started

…and descriptors . SMP — Negotiates pairing and bonding , including key generation for LESC . GAP and GATT Roles…

BLE GATT Server Implementation Guide

Development

…pairing Sensitive commands For the full pairing and bonding flow, see BLE Protocol Stack Architecture .

Android BLE Development: From Scanning to Data Transfer

Development

…after 30 min Background restriction Use foreground service Bonding loop Incorrect CCCD write order Write CCCD after discovery…

iOS Core Bluetooth: Building BLE Apps for iPhone

Development

…app when the system kills it while a connection is active. Bonding is transparent — iOS stores keys in the Keychain…

BLE Security: Pairing, Bonding, and Encryption

Protocols & Profiles

…This guide walks through every pairing method, explains bonding, and shows how LE Secure Connections closes the classic…

BLE in Healthcare: Medical Devices and Patient Monitoring

Industry Applications

…found" — handle all response codes per profile spec Bonding : Medical devices should bond with the collector — prevent…

BLE Electronic Shelf Labels: Retail Price Tag Automation

Industry Applications

…in payload; tags reject out-of-order or replayed updates Bonding : Tags bond to authorized gateway only; reject advertising…

BLE Smart Home: Locks, Sensors, and Home Automation

Industry Applications

…authentication over GATT (never send raw credentials) Bonding with allowlist — reject connections from unknown LTK…

자주 묻는 질문

Our glossary covers 90+ BLE technical terms organized by category. Each term includes a definition, related terms, and links to relevant chips and guides.