Pairing

<\/script>\n
'; }, get iframeSnippet() { const domain = '{ SITE_DOMAIN }'; const type = '{ embed_type }'; const slug = '{ embed_slug }'; return ''; }, get activeSnippet() { return this.method === 'script' ? this.scriptSnippet : this.iframeSnippet; }, copySnippet() { navigator.clipboard.writeText(this.activeSnippet).then(() => { this.copied = true; setTimeout(() => { this.copied = false; }, 2000); }); } }" @keydown.escape.window="open = false" @click.outside="open = false">

Embed This Widget

Theme


      
    

Widget powered by . Free, no account required.

The process of establishing a temporary security association between two BLE devices by exchanging encryption keys.

다른 명칭: BLE Pairing

What Is BLE Pairing?

Pairing is the security procedure through which two BLE devices establish a shared set of encryption keys. Once paired, the link is encrypted with AES-128-CCM, protecting data exchanged over GATT operations from eavesdropping and tampering. Pairing is managed by the Security Manager Protocol (SMP) and is distinct from bonding, which adds persistent key storage.

Pairing Phases

BLE pairing proceeds in three phases:

Phase 1 -- Feature Exchange. The two devices exchange their I/O capabilities (display, keyboard, yes/no buttons), authentication requirements (MITM protection), and supported pairing methods. This exchange determines which association model will be used: Just Works, Passkey Entry, Numeric Comparison, or OOB.

Phase 2 -- Key Generation. For LE Secure Connections (LESC), both devices perform an Elliptic Curve Diffie-Hellman (ECDH) key exchange on the P-256 curve, producing a shared secret that is then used to derive the Long Term Key (LTK). For Legacy Pairing, a Temporary Key (TK) is generated from the association model output, and a Short Term Key (STK) encrypts the link.

Phase 3 -- Key Distribution. The devices exchange additional keys over the now-encrypted link: the LTK (for future reconnections), the Identity Resolving Key (IRK, for LE Privacy), and optionally the Connection Signature Resolving Key (CSRK).

Initiating Pairing

Pairing can be triggered in several ways. The most common is a security request from the peripheral, which prompts the central to begin the pairing procedure. Alternatively, accessing a ATT">gatt-characteristic/" class="glossary-term-link" data-term="GATT characteristic" data-definition="Data value within a BLE service with R/W/N properties." data-category="GATT & ATT">GATT characteristic that requires authentication will cause the stack to return an Insufficient Authentication error, which a well-implemented central handles by automatically initiating pairing.

Security Levels

BLE defines four security levels (modes):

Level Encryption MITM Protection Pairing Method
1 (No security) No No None
2 (Unauthenticated) Yes No Just Works
3 (Authenticated) Yes Yes Passkey / Numeric Comparison / OOB
4 (LESC Authenticated) Yes Yes LESC + Passkey / NC / OOB

Choose the minimum level that your application's threat model requires. Over-specifying security (e.g., requiring Passkey Entry for a temperature sensor) degrades user experience without meaningful benefit.

Related Terms

Understanding BLE Architecture: Protocol Stack Overview

Getting Started

…data model ATT Host Attribute read/write protocol SMP Host Pairing, key distribution GAP Host Discovery, connection…

Python BLE with Bleak: Cross-Platform BLE Scripting

Development

…connection may fail if the device is cached from a prior pairing . Clear stale bonds with bluetoothctl remove <ADDR>…

BLE Security: Pairing, Bonding, and Encryption

Protocols & Profiles

…key generation, and encryption. Choosing the wrong pairing method leaves user data exposed; choosing an overly strict…

BLE Smart Home: Locks, Sensors, and Home Automation

Industry Applications

…: LE Secure Connections (LESC) mandatory — reject legacy pairing Challenge-response authentication over GATT (never send…

BLE Connection Issues: Diagnosis and Resolution Guide

Troubleshooting

…phases: discovery (device not visible), establishment (pairing/bonding failures), and maintenance (random…

BLE Vulnerabilities: Known Attacks and Mitigations

Security & Privacy

…4.0. Most critical vulnerabilities exploit weaknesses in pairing , key exchange, or feature negotiation rather than the…

BLE Pairing Methods Compared: Just Works vs Passkey vs OOB

Security & Privacy

BLE Pairing Methods Compared: Just Works vs Passkey vs OOB BLE pairing…

BLE MITM Prevention: Securing Against Man-in-the-Middle Attacks

Security & Privacy

…Attacks A Bluetooth Low Energy MITM attack intercepts the pairing exchange and substitutes the attacker's public key for the…

자주 묻는 질문

Our glossary covers 90+ BLE technical terms organized by category. Each term includes a definition, related terms, and links to relevant chips and guides.