1. Introduction

1.1. Before You Start

Before you start you need to:

  • Install the latest SmartSnippets Studio
  • Download the latest SDK (currently version

These can be downloaded from the Dialog Semiconductor support portal.

Additionally, for this tutorial either a Pro or Basic Development kit is required.

The key goals of this tutorial are to:

  • Provide a basic understanding of the secure boot mechanism
  • Set up a working demonstration of firmware digitally signed and securely executed
  • Explain the various options the security boot toolbox has to offer

1.2. Security for IoT Devices

The interconnection of most electronic devices used in daily life brings a need for a higher level of security for those devices. This is necessary to gain public confidence in the ecosystem that IoT companies are bringing to the end customer. Dialog Semiconductor acknowledges this challenge and answers it by providing cutting edge security technology with the DA14682/DA14683.

1.3. DA14682/DA14683 Security Features

The DA14682/DA14683 provides the following security features:

  • The security framework. This is a set of software libraries and hardware accelerators built to allow secure communication with peer devices. These are features built on top of the native Bluetooth low energy security. You can find more details about the Security framework in The Security Framework section of the Platform Reference Manual. The security framework is out of the scope of this tutorial.
  • JTAG/SWD production disable. This is a quite standard feature in the microcontroller industry. The DA14682/DA14683 can disable access to the debugger port to prevent unwanted access to the device.
  • The secure boot. This feature ensures the firmware image running on the DA14682/DA14683 can be trusted and is free from tampering. This is performed by the Secondary Boot Loader (SBL) and is described in the Secure Boot Overview section. The SBL and its operation is the main topic of this tutorial.