Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

被引:38
|
作者
Ghori, Muhammad Rizwan [1 ]
Wan, Tat-Chee [1 ,2 ]
Sodhy, Gian Chand [1 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, George Town 11800, Malaysia
[2] Univ Sains Malaysia, Natl Adv IPv6 Ctr, George Town 11800, Malaysia
关键词
bluetooth low energy; BLE; wireless mesh networks; IoT security; INTRUSION DETECTION SYSTEM; ROUTING PROTOCOL; WIRELESS; INTERNET; AUTHENTICATION; MACHINE;
D O I
10.3390/s20123590
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks.
引用
收藏
页码:1 / 35
页数:35
相关论文
共 50 条
  • [31] Implementation of Mesh Network Using Bluetooth Low Energy Devices
    Gomathinayagam, P.
    Jayanthy, S.
    INTELLIGENT AND EFFICIENT ELECTRICAL SYSTEMS, 2018, 446 : 205 - 213
  • [32] On communication protocols in unreliable mesh networks and their relation to phase transitions
    Nehéz, M
    Bernát, D
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 235 - 240
  • [33] Secure Multicasting Protocols in Wireless Mesh Networks-A Survey
    Surlees, Seetha
    Francis, Sharmila Anand John
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, 2014, 246 : 245 - 256
  • [34] Hardware-aware communication protocols in low energy wireless sensor networks
    Jin, FC
    Choi, HA
    Subramaniam, S
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 676 - 681
  • [35] An Adaptive Duty Cycling Mechanism for Energy Efficiency in Bluetooth Mesh Networks
    Mehrazi, Sheida
    Nabi, Majid
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [36] Audio Streaming and Multimedia Communication with Bluetooth Low Energy
    Aslantas, Recep
    Toptas, Faruk
    Gumuskaynak, Enes
    Celik, Tunahan
    Balki, Fatih
    Ozen, Yunus
    Sarp, Salih
    DIGITAL INTERACTION AND MACHINE INTELLIGENCE, MIDI 2023, 2024, 1076 : 114 - 120
  • [37] A survey on security and privacy issues in Wireless Mesh Networks
    Sgora, Aggeliki
    Vergados, Dimitrios D.
    Chatzimisios, P.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1877 - 1889
  • [38] A Survey on Wireless Mesh Networks and its Security Issues
    Regan, R.
    Manickam, J. Martin Leo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 405 - 417
  • [39] Energy Modeling of Neighbor Discovery in Bluetooth Low Energy Networks
    Luo, Bingqing
    Gao, Jincheng
    Sun, Zhixin
    SENSORS, 2019, 19 (22)
  • [40] A Survey of Cooperative MAC Protocols for Mobile Communication Networks
    Zhuang, Weihua
    Zhou, Yong
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (04): : 541 - 559