Next Article in Journal
In-Situ Measurement of Fresh Produce Respiration Using a Modular Sensor-Based System
Next Article in Special Issue
An Analysis Scheme of Balancing Energy Consumption with Mobile Velocity Control Strategy for Wireless Rechargeable Sensor Networks
Previous Article in Journal
Separable EEG Features Induced by Timing Prediction for Active Brain-Computer Interfaces
Previous Article in Special Issue
Multipath Map Method for TDOA Based Indoor Reverse Positioning System with Improved Chan-Taylor Algorithm
Open AccessReview

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

1
School of Computer Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia
2
National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang 11800, Malaysia
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(12), 3590; https://doi.org/10.3390/s20123590
Received: 5 May 2020 / Revised: 15 June 2020 / Accepted: 15 June 2020 / Published: 25 June 2020
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks. View Full-Text
Keywords: bluetooth low energy; BLE; wireless mesh networks; IoT security bluetooth low energy; BLE; wireless mesh networks; IoT security
Show Figures

Figure 1

MDPI and ACS Style

Ghori, M.R.; Wan, T.-C.; Sodhy, G.C. Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols. Sensors 2020, 20, 3590.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop