Cargando…
Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topo...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7349184/ https://www.ncbi.nlm.nih.gov/pubmed/32630381 http://dx.doi.org/10.3390/s20123590 |
_version_ | 1783557003753291776 |
---|---|
author | Ghori, Muhammad Rizwan Wan, Tat-Chee Sodhy, Gian Chand |
author_facet | Ghori, Muhammad Rizwan Wan, Tat-Chee Sodhy, Gian Chand |
author_sort | Ghori, Muhammad Rizwan |
collection | PubMed |
description | Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks. |
format | Online Article Text |
id | pubmed-7349184 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-73491842020-07-22 Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols Ghori, Muhammad Rizwan Wan, Tat-Chee Sodhy, Gian Chand Sensors (Basel) Review Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks. MDPI 2020-06-25 /pmc/articles/PMC7349184/ /pubmed/32630381 http://dx.doi.org/10.3390/s20123590 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Ghori, Muhammad Rizwan Wan, Tat-Chee Sodhy, Gian Chand Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols |
title | Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols |
title_full | Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols |
title_fullStr | Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols |
title_full_unstemmed | Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols |
title_short | Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols |
title_sort | bluetooth low energy mesh networks: survey of communication and security protocols |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7349184/ https://www.ncbi.nlm.nih.gov/pubmed/32630381 http://dx.doi.org/10.3390/s20123590 |
work_keys_str_mv | AT ghorimuhammadrizwan bluetoothlowenergymeshnetworkssurveyofcommunicationandsecurityprotocols AT wantatchee bluetoothlowenergymeshnetworkssurveyofcommunicationandsecurityprotocols AT sodhygianchand bluetoothlowenergymeshnetworkssurveyofcommunicationandsecurityprotocols |