2019 IEEE Student Conference on Research and Development (SCOReD) 2019
DOI: 10.1109/scored.2019.8896310
|View full text |Cite
|
Sign up to set email alerts
|

Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Before considering the existing information security mechanisms, its necessary to introduce a classification of possible network attacks on wireless networks [11][12][13]:…”
Section: Wireless Network Vulnerabilitiesmentioning
confidence: 99%
“…Before considering the existing information security mechanisms, its necessary to introduce a classification of possible network attacks on wireless networks [11][12][13]:…”
Section: Wireless Network Vulnerabilitiesmentioning
confidence: 99%
“…It also includes the disruption of wireless communication channels, such as the use of radio frequency jamming attacks. In addition, device cloning, board pin-jacking, and device tampering attacks come under the umbrella of physical attacks [ 69 ].…”
Section: Ble Mesh Security Issuesmentioning
confidence: 99%
“…Z-wave and Bluetooth low energy (BLE) WPAN technologies are popular for their ability to facilitate low data rate communication, thereby enabling low-power sensor nodes that can communicate with each other [3]. In both BLE and Z wave, data can be transferred through multi-hops by using mesh topology [4]. Typically in a mesh network, one main controller acts as the primary coordinator of the network while all other sensor nodes act as routing and data communicating nodes.…”
Section: Introductionmentioning
confidence: 99%