Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 115

Bluetooth LE Security

What is Bluetooth LE Security?

Bluetooth LE SecurityThe pairing, encryption, and privacy mechanisms defined by the Bluetooth Core Specification for Bluetooth Low Energy devices.


Bluetooth Low Energy (BLE) security is governed by the Bluetooth Core Specification, which defines pairing methods (Just Works, Passkey Entry, Numeric Comparison, Out-of-Band), key generation (LE Legacy Pairing vs LE Secure Connections using ECDH P-256), link encryption (AES-CCM), bonding, and address privacy through resolvable private addresses. Many BLE devices ship with the weakest method (Just Works), which provides encryption but no MITM protection, and accept long-term keys that never rotate, making relay and impersonation attacks practical. Application-layer protocols (GATT) often expose unauthenticated characteristics. Hardening involves LE Secure Connections, MITM-resistant pairing, signed firmware, attribute permissions that require authentication and encryption, and operating-system-level controls such as iOS/Android pairing prompts.

Examples

  1. 01

    A medical sensor pairing with a phone using Numeric Comparison over LE Secure Connections to prevent MITM.

  2. 02

    Researchers showing that a smart lock accepts unauthenticated GATT writes to unlock the door.

Frequently asked questions

What is Bluetooth LE Security?

The pairing, encryption, and privacy mechanisms defined by the Bluetooth Core Specification for Bluetooth Low Energy devices. It belongs to the OT / ICS / IoT category of cybersecurity.

What does Bluetooth LE Security mean?

The pairing, encryption, and privacy mechanisms defined by the Bluetooth Core Specification for Bluetooth Low Energy devices.

How does Bluetooth LE Security work?

Bluetooth Low Energy (BLE) security is governed by the Bluetooth Core Specification, which defines pairing methods (Just Works, Passkey Entry, Numeric Comparison, Out-of-Band), key generation (LE Legacy Pairing vs LE Secure Connections using ECDH P-256), link encryption (AES-CCM), bonding, and address privacy through resolvable private addresses. Many BLE devices ship with the weakest method (Just Works), which provides encryption but no MITM protection, and accept long-term keys that never rotate, making relay and impersonation attacks practical. Application-layer protocols (GATT) often expose unauthenticated characteristics. Hardening involves LE Secure Connections, MITM-resistant pairing, signed firmware, attribute permissions that require authentication and encryption, and operating-system-level controls such as iOS/Android pairing prompts.

How do you defend against Bluetooth LE Security?

Defences for Bluetooth LE Security typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Bluetooth LE Security?

Common alternative names include: BLE security, Bluetooth Low Energy security.

Related terms