Building a secure BLE tree network
A walkthrough of the final project for my security class, a secure ad-hoc Bluetooth network over BLE with a tree topology, mutual auth, ECDH session keys, and DTLS-style end-to-end encryption
A walkthrough of the final project for my security class, a secure ad-hoc Bluetooth network over BLE with a tree topology, mutual auth, ECDH session keys, and DTLS-style end-to-end encryption