If you are having issues with the exercises, please create a ticket on DevZone:
Click or drag files to this area to upload. You can upload up to 2 files.

Lesson 5 – Security in Bluetooth LE communication


Securing a Bluetooth LE link is one of the main requirements when developing a Bluetooth LE application. The Bluetooth LE protocol offers many features related to security, including authentication, integrity, confidentiality and privacy.

In this lesson, we will introduce the security features offered in Bluetooth LE, both legacy security and LE Security Connections, and cover the pairing process for both methods. We will discuss the main security concerns within Bluetooth LE and how to combat them using different security levels, and the use of a Filter Accept List when establishing and encrypting the connection.

In the exercise section of this lesson, we will first practice adding pairing support to an application. Then we will build on this, by adding bonding and taking a look at how to use the bonding information to create a Filter Accept List and advertising using a Filter Accept List.


  • Understand the basics of authentication and encryption procedures
  • Learn about different security levels and security concerns in Bluetooth LE
  • Get to know the Filter Accept List
  • Learn the difference between Legacy pairing and LE Secure Connections pairing
  • Go through the steps needed to add pairing support to an application, and adding passkey authentication to the pairing.
  • Practice through hands-on exercises adding a Filter Accept List to the application and how to store and restore the bonding data from persistent memory.
Register an account
Already have an account? Log in
(All fields are required unless specified optional)

  • 8 or more characters
  • Upper and lower case letters
  • At least one number or special character

Forgot your password?
Enter the email associated with your account, and we will send you a link to reset your password.