Cargando…

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topo...

Descripción completa

Detalles Bibliográficos
Autores principales: Ghori, Muhammad Rizwan, Wan, Tat-Chee, Sodhy, Gian Chand
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7349184/
https://www.ncbi.nlm.nih.gov/pubmed/32630381
http://dx.doi.org/10.3390/s20123590
_version_ 1783557003753291776
author Ghori, Muhammad Rizwan
Wan, Tat-Chee
Sodhy, Gian Chand
author_facet Ghori, Muhammad Rizwan
Wan, Tat-Chee
Sodhy, Gian Chand
author_sort Ghori, Muhammad Rizwan
collection PubMed
description Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks.
format Online
Article
Text
id pubmed-7349184
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-73491842020-07-22 Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols Ghori, Muhammad Rizwan Wan, Tat-Chee Sodhy, Gian Chand Sensors (Basel) Review Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks. MDPI 2020-06-25 /pmc/articles/PMC7349184/ /pubmed/32630381 http://dx.doi.org/10.3390/s20123590 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Ghori, Muhammad Rizwan
Wan, Tat-Chee
Sodhy, Gian Chand
Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
title Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
title_full Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
title_fullStr Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
title_full_unstemmed Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
title_short Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
title_sort bluetooth low energy mesh networks: survey of communication and security protocols
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7349184/
https://www.ncbi.nlm.nih.gov/pubmed/32630381
http://dx.doi.org/10.3390/s20123590
work_keys_str_mv AT ghorimuhammadrizwan bluetoothlowenergymeshnetworkssurveyofcommunicationandsecurityprotocols
AT wantatchee bluetoothlowenergymeshnetworkssurveyofcommunicationandsecurityprotocols
AT sodhygianchand bluetoothlowenergymeshnetworkssurveyofcommunicationandsecurityprotocols