User manual
A.2.5 Encryption Key Generation and Distribution 225
A.2.6 Encrypting The Data Transmission 226
A.2.7 IRK and CSRK Revisited 226
A.2.8 Table of Acronyms 227
A.3 Bluetooth Virtual Sniffing 228
A.3.1 Introduction 228
A.3.2 Why HCI Sniffing and Virtual Sniffing are Useful 228
A.3.3 Bluetooth Sniffing History 229
A.3.4 Virtual Sniffing—What is it? 229
A.3.5 The Convenience and Reliability of Virtual Sniffing 230
A.3.6 How Virtual Sniffing Works 230
A.3.7 Virtual Sniffing and Bluetooth Stack Vendors 230
A.3.8 Case Studies: Virtual Sniffing and Bluetooth Mobile Phone Makers 231
A.3.9 Virtual Sniffing and You 231
TELEDYNE LECROY
Frontline BPA low energy Hardware & Software User Manual vi