SWRA732 December   2021 CC1352P , CC1352R , CC2642R , CC2652R , CC2652R7 , CC2652RSIP

 

  1.   Abstract
  2.   Trademarks
  3. Introduction
  4. Reference Examples
  5. Software Block Diagram
  6. Network Topology and Features
  7. Security
  8. Performance and Test Data
    1. 6.1 Hardware Setup
    2. 6.2 Software Setup
  9. Power Consumption of the Low Power Node (LPN)
  10. Out-of-Box Experience
  11. Tools
  12. 10Known Limitations
  13. 11References

Security

TI’s Bluetooth Mesh solution, based on the Bluetooth Mesh Profile specification [3], supports mandatory key security features to protect against privacy concerns, replay attacks, trashcan attacks, and more. Features like encryption, authentication, the use of separate application and network keys, key refresh, sequence numbering and IV indexes, along with AES-CMAC and AES-CCM algorithms are all used to protect a Bluetooth mesh network from malicious attacks.

All messages in the mesh network are encrypted and authenticated using two types of keys. One key type is for the network layer communication. This ensures that all communication within a mesh network uses the same network key. The other key type is for application data. Separating the keys for networking and applications allows sensitive access messages (e.g. for access control to a building) to be separated from non-sensitive access messages (e.g. for lighting).

In addition, the network security model utilizes a privacy mechanism called obfuscation which utilizes the Advanced Encryption Standard (AES) to encrypt the source address, sequence numbers, and other header information using a private key. The intent for obfuscation is to make tracking nodes more difficult.

For more information regarding Bluetooth mesh security, refer to the SDK User's Guide and navigate to Bluetooth Mesh Overview [9].