2020
DOI: 10.3390/s20123590
|View full text |Cite
|
Sign up to set email alerts
|

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

Abstract: Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(26 citation statements)
references
References 107 publications
(133 reference statements)
0
15
0
Order By: Relevance
“…So, there are many research opportunities to create a secured mesh network using short-range BLE technology. As a huge number of devices are participating in this network, there are many security and privacy concerns that need to be investigated [172] at the physical, link, network, and application layers. Some open issues in the BLE mesh network [173] are real-time communication [174], efficient multicast [173], efficient authentication, efficient auto-configuration, and interoperability.…”
Section: Future Research Directionsmentioning
confidence: 99%
See 1 more Smart Citation
“…So, there are many research opportunities to create a secured mesh network using short-range BLE technology. As a huge number of devices are participating in this network, there are many security and privacy concerns that need to be investigated [172] at the physical, link, network, and application layers. Some open issues in the BLE mesh network [173] are real-time communication [174], efficient multicast [173], efficient authentication, efficient auto-configuration, and interoperability.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…There is a lack of efficient techniques to secure the BLE mesh network. Currently, there is an open research opportunity to protect the BLE mesh network from zero-day vulnerability, DoS attacks, spoofing attacks [110] using intrusion detection systems [172], [179] and intrusion prevention systems, and watchdogs. Introducing new aspects of machine learning algorithms is a promising area of research for enhancing the security and privacy of IoT devices.…”
Section: ) Machine Learning In Ble Securitymentioning
confidence: 99%
“…Devices that are not a part of any mesh network are called unprovisioned devices. The provisioning process [17] is carried out by a provisioner device, which authenticates unprovisioned devices, assigns an address, and transmits encryption keys [18]. Further configuration of a node is performed by a configuration client, which can be a part of a provisioner device or a part of another node.…”
Section: Bluetooth Mesh Overviewmentioning
confidence: 99%
“…Any other solution for BLE mesh must be implemented on top of the stack in the application layer, which necessarily incurs a communication overhead. Furthermore, in the literature there are few measured power results for Bluetooth multi-hop networks, as most results are based on analytical calculations or simulations [ 7 , 8 ].…”
Section: Introductionmentioning
confidence: 99%