You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Editor’s Choice
  • Review
  • Open Access

6 February 2023

Bluetooth Low Energy Mesh: Applications, Considerations and Current State-of-the-Art

,
,
and
1
School of Information Technology, Deakin University, Geelong, VIC 3220, Australia
2
Nanotechnology Facility, Swinburne University of Technology, John St., Hawthorn, VIC 3122, Australia
3
Ampcontrol Burn Brite Ltd., 1/100 New Street, Ringwood, VIC 3134, Australia
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

With the proliferation of IoT applications, more and more smart, connected devices will be required to communicate with one another, operating in situations that involve diverse levels of range and cost requirements, user interactions, mobility, and energy constraints. Wireless technologies that can satisfy the aforementioned requirements will be vital to realise emerging market opportunities in the IoT sector. Bluetooth Mesh is a new wireless protocol that extends the core Bluetooth low energy (BLE) stack and promises to support reliable and scalable IoT systems where thousands of devices such as sensors, smartphones, wearables, robots, and everyday appliances operate together. In this article, we present a comprehensive discussion on current research directions and existing use cases for Bluetooth Mesh, with recommendations for best practices so that researchers and practitioners can better understand how they can use Bluetooth Mesh in IoT scenarios.

1. Introduction

Communication plays a vital role in many modern applications, especially in the area of the Internet-of-Things (IoT). Compared to the traditional wired communication mechanisms, wireless communication technologies are required due to the advantages they offer, including efficiency, availability, flexibility, reduced installation problems, and cost savings. However, wireless technologies, namely ZigBee, Z-Wave, Thread, 6LoWPAN, and Wi-Fi, suffer from drawbacks such as reduced coverage, latency, and low level of reliability due to the loss of data packets, and hence are not able to sufficiently fulfill the requirements of many IoT applications.
Bluetooth Mesh (BT Mesh) is a new wireless protocol officially released in 2017, developed to provide extended coverage and higher robustness as well as reduced cost and low power consumption. This version of Bluetooth is built on top of the core Bluetooth low energy (BLE) stack of the Bluetooth 4.2 specification. BT Mesh allows for many-to-many communication over BLE, enabling the the creation of a mesh network of Bluetooth devices. The features of BT Mesh make it ideally suited for many IoT based applications such as home and industrial automation. Other mesh networks, such as WiFi, ZigBee, Thread, and Z-Wave, use high delay routing techniques, whereas BT Mesh uses a flooding technique that is highly reliable and easy to implement. One of the main disadvantages of flooding is that it usually tries to create a large number of duplicate data packets. To minimize this problem, BT Mesh uses “managed” flooding.
As BT Mesh is an emerging and evolving technology, we have a limited number of papers in the literature that cover various aspects of BT Mesh. There are only a few survey papers focusing on BT Mesh explicitly. For example, the paper in ref. [1] is one of the first papers to discuss the BT Mesh standard and uses a three-pronged approach to evaluate the BT Mesh specification—namely, an experimental evaluation, a statistical approach, and a graph-based simulation using metrics such as round-trip time (RTT), throughput, and energy consumption. However, since this paper was published in 2018, not many related papers using the BT Mesh specification are included. The survey by Yin et al. [2] is the first to review BT Mesh, and it discusses the evolution of BT technology and introduces the new features of Bluetooth 5.0 and BT Mesh. Because many of the new enhancements in BT 5.0 and BT Mesh are for BLE, and hence are similar, the article takes the viewpoint that both specifications are in the same group but fall to different layers of upgrades. This article was published in 2019, and BT Mesh had only been officially released by the Bluetooth Special Interest Group (SIG) in 2017. Hence, very few related papers on BT Mesh are reviewed in [2]. The survey paper by Ghori, Wan, and Sodhy in 2020 [3] reviews BLE-based mesh network protocols and related security issues. However, this article’s focus is not on the BT Mesh standard itself and considers various BLE-based mesh communication protocols. The survey paper by Hernández-Solana et. al [4] provides an overview of the BT Mesh standard with an analysis of the BT Mesh technology and discusses associated challenges. The authors discuss technology related to BT Mesh in detail, focusing on BT Mesh architecture and the illustration of BT Mesh communication protocol. In [5], Darroudi, Gomez, and Crowcroft provide a comprehensive comparison of two BLE mesh networking standards, BT Mesh and 6BLEMesh, produced by the Bluetooth SIG and IETF, respectively, discussing their main features and performance characteristics and trade-offs.
However, none of these existing survey papers comprehensively consider the heterogeneous requirements of various IoT scenarios and discuss how BT Mesh can be applied in practice in diverse conditions. To the best of our knowledge, there is no single BT Mesh related paper that can serve as a reference point for a practitioner to understand its architecture, how it compares with other related wireless protocols, what has been investigated in related BT Mesh literature, and how it can be used in IoT scenarios. This paper aims to address this gap. The primary focus of this paper is to provide a comprehensive overview of BT Mesh that includes a brief introduction of BT Mesh technology, a comparison with other wireless technologies such as Wi-Fi, Z-Wave, and Zigbee, and a discussion about the current implementations of BT Mesh that are reported in the literature with an analysis of IoT application requirements and how they can be fulfilled by BT Mesh. We have outlined a number of different aspects of BT Mesh, such as reliability, delay, scalability, memory utilization, and effects on user traffic. Further, we have implemented a basic BT Mesh network and presented our observations. As BT Mesh technology is in its early days, we also discuss the challenges related to BT Mesh technology and its future directions.
The main contributions of the paper can be summarised below.
  • To the best of our knowledge, this is the first research work exploring the practical applicability, challenges, and opportunities of using BT Mesh for a diverse set of IoT scenarios.
  • This work presents a review of BT Mesh experimental investigations from related work and insights from our test-bed, analysing real-world implications for latency, energy, scalability, and reliability based on BT Mesh parameters and behaviour.
In this study, we used a literature survey design to identify related work on BT Mesh and the Internet of Things. This study reviews research that has been published between 2017 and 2022, since the official BT Mesh was released by the Bluetooth Special Interest Group (SIG) in 2017. However, a few papers prior to 2017 have also been included for discussing IoT and software aspects. Digital tools and databases such as Google Scholar, ACM DL, and IEEE Xplore were used to find relevant articles. Articles that focus on Bluetooth without investigation of the BT Mesh standard were excluded.
The remainder of this paper is organized as follows. The overview of the BT Mesh technology with protocol stack, different node types, and privacy and security are presented in Section 2. In Section 3, real-world implementations of BT Mesh in IoT contexts are discussed. The comparison of BT Mesh technology with other related protocols is presented in Section 4. In Section 5, BT Mesh experiments reported in the literature are discussed. The group messaging related experiments performed by us are reported together with the experimental setup in Section 6. The challenges related to BT Mesh are discussed in Section 7. Finally, Section 8 concludes the paper with some future directions.

2. Overview of Bluetooth Mesh

The Bluetooth mesh specification was published by the Bluetooth Special Interest Group (SIG) (https://www.bluetooth.com/ accessed on 15 January 2022) in 2017. BT Mesh protocol stack operates on the core Bluetooth low energy (BLE) stack of the Bluetooth® 4.2 specification, which facilitates backward compatibility with Bluetooth version 4.0 and higher.
The Bluetooth Mesh messages are typically carried inside the payload of BLE advertisement packets (except in the case of legacy Bluetooth devices, which use a different approach, explained later in this section). From the different types of advertising events available in BLE, BT Mesh uses an event type named “nonconnectable undirected event”, which is intended to allow a scanner to receive information from the advertiser, but not to respond to other requests [6]. The corresponding PDU packet format is shown in Figure 1.
Figure 1. The PDU format of BT Mesh protocol.
Figure 2 illustrates the layered architecture of BT Mesh and functions of each layer.
Figure 2. BT Mesh protocol stack.
The BLE stack is the foundation of BT Mesh protocol stack, ensuring core wireless communication capabilities. The entire BT Mesh technology works on three advertising channels only, transmitting data on channels 37, 38, and 39 reserved for all connection-less communications.
Data transmission is enabled via the Bearer Layer, which defines how packet data units (PDU) should be handled when they are transmitted. Currently BT Mesh has two bearers defined, namely, Advertising Bearer and Generic Attribute Profile (GATT) Bearer. The Advertising Bearer is the default bearer and defines non-connectable advertising PDUs and scanning configuration to assist mesh communications. When a device is unable to use the Advertising Bearer (such as a legacy Bluetooth low energy device that does not support the Advertising Bearer), the GATT Bearer is used. It utilizes proxy protocol to transmit and receive proxy PDUs in the mesh network. In this way, legacy Bluetooth devices, such as devices with versions older than Bluetooth 4.0, can be allowed to participate in the mesh network. The proxy feature is described in more detail in Section 2.1.4.
The Network Layer helps transport layer PDUs to be transported by the Bearer Layer by defining message address types and a network message format. End-to-end transmission is enabled via a controlled flooding (also called managed flooding) mechanism. Each message header contains a time to live (TTL) value, which dictates the maximum number of hops. The TTL value is decremented each hop. Thus, the TTL field provides a way to “control” the degree of flooding that can take place in the BT Mesh network.
The Lower Transport Layer passes the PDUs it gets from the Upper Transport Layer to the Lower Transport Layer on a peer device. If necessary, this layer has the capability to divide and reorganize the PDUs.
The main purpose of the Upper Transport Layer is to provide security and validation of application data that are exchanged with the Access Layer. It also enables the periodic transmission of heartbeat messages, which signal that the transmitting nodes are still active. They can also be used by receiving nodes to determine how far the sender is [7].
The Access Layer facilitates applications to use the aforementioned Upper Transport Layer and defines the format of application data and encryption and decryption processes. The Access Layer provides standardized communication between different hardware and different device vendors. This was achieved in the Bluetooth Mesh specification by introducing the Element and Model concept.
The top two layers are the Foundation Models and the Models layers. In BT Mesh, models are the collection of concepts, definitions, and functionalities related to the mesh network. Models determine the functions provided by a node. Each node can have multiple models. A model is always part of an Element, which is an addressable entity within a node. In a device there can be one or more elements. Each Element in the device has been assigned a unique unicast address during the provisioning process. For example, a node can contain a model that provides a light switch function as well as another model that provides a sensor data collection function [8]. These models are classified into server model, client model, and control model. The Foundation Model Layer enables the implementation and maintenance of the mesh network. The Model Layer enables implementation of models required for specific BT Mesh applications, such lighting apps for home automation.

2.1. Different Node Types in BT Mesh

A BT Mesh network typically includes a large number of devices called nodes. Devices that are not part of the BT Mesh network are called “unprovisioned devices”. The mechanism that converts an unprovisioned device into a node is called “provisioning”. All nodes have the ability to transmit and receive mesh messages. However, based on the additional features, they can be broadly grouped into four types: Relay, Proxy, Friend, and Low Power nodes (LPN) [9].

2.1.1. Relay Node

Nodes that can retransmit received messages are called relay nodes. Relay nodes provide enhanced BT Mesh network coverage area. The mesh coverage area can be extended via relay nodes, as messages can make multiple “hops” between devices by being relayed. However, relay nodes can cause network congestion. To overcome this, in BT Mesh, PDUs include a time to live (TTL) field. The number assigned to this field limits the maximum number of hops away from the originating node a massage can be relayed.

2.1.2. Low-Power Node (LPN)

As the name implies these, LPNs consume lower energy for their functionality. This is achieved via reduction in reception duty cycles. Usually these nodes are battery powered. A typical LPN mostly transmits periodically and only receives data occasionally. Hence LPNs need collaboration of another node to support its functionality.

2.1.3. Friend Node

A node that supports an LPN is known as a friend node. The Friend node stores messages addressed to the LPN and delivers them to the LPN when the LPN requests the messages. When the LPN requests, all the stored messages are forwarded to the LPN sequentially. As friend nodes require a higher amount of energy; they are usually powered by the main AC power supply.

2.1.4. Proxy Node

Currently, certain devices, such as some mobile phones and Wi-Fi-Bluetooth Mesh gateways, can support Bluetooth low energy, but may not be able to support the new BT Mesh networking stack. However, because they support Bluetooth low energy, it is possible for them to participate in a BT Mesh network using the GATT bearer with the help of a Proxy node. A Proxy node functions as a middle entity to assist such legacy devices to connect to the mesh network by exposing the GATT proxy protocol PDUs, and the Proxy node converts them to mesh PDUs. In this way, the Proxy feature helps a node to pass through messages between the GATT and Advertising Bearers. In a typical BT Mesh network, multiple nodes can support the proxy feature.

2.2. Addressing

Bluetooth Mesh addressing plays a vital role in the mesh devices and groups identification and communication process. There are three types of addresses in BT Mesh:
1.
Unicast addresses: The unicast address is assigned to each element of the node during the new node adding process to the mesh network. The unicast address cannot be changed during the lifetime of the node on the mesh network. The unicast addresses are assigned sequentially.
2.
Group addresses: Group addresses are multicast addresses on the mesh network. They are used to communicate with multiple nodes at once. The nodes or elements are assigned to the group address during the node configuration process.
3.
Virtual addresses: Users can generate virtual addresses, and they can be considered as a special kind of group address.

2.3. Privacy and Security of BT Mesh

To protect the privacy of the data being exchanged, all the messages in BT Mesh are encrypted and authenticated. In BT Mesh, security is handled in different layers: network security, application security, and device security.
Whereas in BLE, GATT devices’ security features are optional, in BT Mesh, security is mandatory. In the BLE GATT devices, the network designer can decide the level of security required for particular applications based on their risk assessment. In BT Mesh, security is enforced, as the security of the entire network is considered instead of individual devices.

2.3.1. Separation of Concerns

The idea behind this feature is to ensure only nodes that need particular information will know the information. In other words, a node could relay a message without knowing the full content of the message. In BT Mesh networking, separate security keys called AppKeys for different applications, such as lighting and heating, are used to secure messages at the network layer. Different network keys are assigned to different subnets. Knowing a network key makes a node member of the corresponding subnet. Using the network keys, network encryption keys and privacy keys are generated. In addition, each node in a BT Mesh network has a unique device key that is used for the configuration and provisioning of the node.

2.3.2. Area Isolation

Each subnet in the mesh can be identified using its unique network key. Hence, access to the subnets can be properly manged within subnets, which cryptographycally isolate individual subnets.

2.3.3. Secure Device Provisioning

Adding a new device without considering security can create serious security problems, as a new device will get the network key that all the other devices in the network have. Therefore, new devices are added to the BT Mesh network via a secure process. Using the instructions provided by the new device manufacturer, the provisioner adds the device to the BT Mesh network. The device addition process involves several steps, including exchange of public keys, authentication, and distribution of the provisioning data. To protect the BT Mesh network from eavesdroppers, an asymmetric cryptography based algorithm is used to create public keys. The authentication is performed via the exchange of cryptographic hash between the device and the provisioner. For the secure distribution of the provisioning data, session keys are used. These session keys are derived from using the respective private keys of two devices.

2.3.4. The Key Refresh Procedure

To enhance the security of the BT Mesh networks, all the security keys are changed on the request of the user. Using the configuration messages, the provisioner generates and sends new security keys to all the nodes in a BT Mesh network. It should be noted that LPNs in a BT Mesh network receive the new keys with a delay. This is due to the fact that they need to receive the keys from their respective “friend” nodes. As all the nodes do not receive their new set of keys at the same time, to ensure proper functioning of the network, a transition period is introduced where both the old keys and the new keys are used. At the end of the transition period, the provisioner informs the nodes that the new key updating is completed.

2.3.5. Message Obfuscation

To protect the privacy of the data, it is important to make sure that the messages are not tracked. To make the tracking of network PDUs difficult, network keys are used to obfuscate network PDU header values.

3. Applications of Bluetooth Mesh

BT Mesh network implementations for IoT applications found in the literature can be categorised as according to their use case, as shown in Table 1. Note that “smart buildings” and “smart lighting” have been classified as two categories, as lighting solutions using BT Mesh are not limited to be inside buildings only and can also be outdoors, such as street lighting, underground mines, etc. Furthermore, although there exists a lot of examples using BLE in IoT applications, especially in smart buildings [10,11], a vast majority of these use BLE only and not BT Mesh, and hence have not been considered in this review.
Table 1. Classification of IoT applications using Bluetooth Mesh in related work.

3.1. Selected IoT Application Implementations

In this section, we discuss details of practical implementations of selected IoT applications from each category identified in Table 1. We use the term “central node” to indicate a node that receives data from others. The term “server node” is used for a node that is connected to the Internet. It can be assumed that both the central node and server node have more processing capabilities than other nodes. Other terms, such as relay and proxy nodes, are used in their usual meanings, which are defined in Section 2.

3.1.1. Smart Buildings

The concept of smart buildings encompasses features such as energy efficiency, building automation, and various assisted living functions [32]. Localisation and tracking of occupants is required for many intelligent functions provided by smart buildings [33]. Several papers have investigated the feasibility of employing BT Mesh for enabling localisation [12,13,14], with mixed results. For example, in [12], the authors tested an experimental setup consisting of ten anchor nodes (ANs) that were already aware of their location and two relays over two levels in a building. Bluetooth beacons were used as unlocated devices (UDs), periodically advertising messages. The ANs receive, process, and forward messages from the UDs and forward them to a gateway via the mesh network. The gateway then forwards the messages to a remote server that runs the inferencing algorithms necessary for localisation. The authors note that, because the mesh network seemed susceptible to various interference in the environment, careful configuration was needed in the positioning of the nodes. Moreover, the limited number of PDUs per second was also not ideal for transmitting the number of measurements needed for continuous indoor positioning.
As another example from literature using BT Mesh for smart building functions, a smart doorbell system was designed in [15] using BT Mesh networks. In [15], a domestic BT Mesh application together with a customised hardware was developed for a doorbell. The proposed application was implemented using Bluetooth Mesh over the BLE stack. In the work proposed in [15], several nodes were connected using the BT Mesh network to transmit messages. These nodes were classified into three groups: client nodes, server nodes, and relay nodes. Client nodes contain a Bluetooth system-on-chip (SoC) module with a button. When a visitor pressed the bell, the node connected to the doorbell sent a message to the server node (SN) via relay nodes (RNs). The SN acted as a gateway and was connected to the Internet. Once the SN received the the message, it sent to every mobile device on the network that a visitor was at the door. These were the only power constrained nodes in the system. In these nodes, messages were published via user interaction (i.e., when a user presses the button). Server anodes were made out of Bluetooth SoCs connected to the Internet via Arduino. UART was used to create the connection between the Bluetooth SoC and the Arduino module. The relay nodes were used to extend the coverage areas. Figure 3 depicts the overall structure of the proposed system.
Figure 3. The BT Mesh network based smart doorbell communication structure, where “N” and “SN” denote a node and a server node, respectively.
It was shown in [15] that the proposed mechanism exhibits lower package losses across typical indoor environments compared to outdoor environments. Further, the method in [15] draws lower power for its functions, as expected.

3.1.2. Smart Lighting

Wireless smart lighting is one of the key applications where BT Mesh has been predicted to be a disruptive technology. These systems can range from simple systems in smart homes to complex setups in commercial and industrial spaces, both indoors and outdoors. The potential of smart lighting systems have been discussed at length in the context of street lighting, warehouses, smart homes, and office spaces [34,35] (even though implementations employing BT Mesh are scarce). At the very basic level, a lighting system would have a group of lights that receives an ON/OFF signal, typically when a user flicks a switch (or a button in a smartphone app). Controlling the colour, brightness, and temperature of the lights, as well as sensor controlled functionality, add increased complexity. When the number of lights increases, the scalability and reliability of data transmission must be catered for. Lighting is inherently tied with human users, and therefore responsiveness in a way that feels natural is a critical requirement. In [21], authors proposed a mechanism to extend the control of light emitting diodes (LEDs) using a BT Mesh network. Figure 4 shows the proposed control system design. In this approach, a smartphone with BLE can be used to control an LED that is far away from the phone. In this mechanism, a smart phone will connect to the nearest bridging device and, via the device, which will be part of the BT Mesh network, a control signal will be sent to the end device. The experiments performed in [21] showed that the proposed mechanism can work well in an obstacle-free environment. The successful transfer rate of LED controlling signal at various distances was measured and the results were presented in [21]. From the results, it is clear that the transfer rate dramatically decreases after 24 m.
Figure 4. The concept of the data communication network presented in [21], where “N” and “PN” denote a node and a proxy node, respectively.

3.1.3. Monitoring

BT Mesh has been employed to support the data transmission from sensors in [13,24,25,26]. In both [13,24], BT Mesh was used to transmit sensor data continuously. The experimental setup in [13] consisted of 33 nodes distributed in a 500 m 2 office area, with all the sensors periodically generating data packets and propagating them towards a base station via a BT Mesh network. A similar setup was used in [24] as well. In both cases, the authors concluded that, although the systems were functional, BT Mesh is best suited for low data rate applications, such as a sporadic or event driven monitoring, and not suited for continuous monitoring applications where nodes have frequent/high data generation.
The aforementioned insights regarding low data rate applications were confirmed in the studies in [25,26], where data were not sent over the BT Mesh network continuously. In [26], if/when a hybrid node with a sensor and BLE beacon identifies a water leak, then the system starts to transmit leak notification messages via the BT Mesh towards an endpoint (e.g., a smartphone) at a maximum rate of once every four seconds. A similar setup seems to have been followed in the warning system using temperature and Hall effect current sensors in [25], although insufficient information is provided about the BT Mesh implementation. Both of the above projects report that the systems were operational and achieved their goals. However there is no evaluation of the BT Mesh performance.

3.1.4. Disaster Communication

Having a communication system that can work after a natural or a man-made disaster (such as an earthquake) is an important and challenging task. This is because a disaster can cause physical damage to the infrastructure and, therefore, power and Internet cables may get damaged. As a result, communication systems that use either the Internet or the main power supply cannot function. To address this vital challenge, in [27], authors developed a BT Mesh network based system. The BT Mesh network is ideally suited for emergency communication (referred to as “Bluemergency”) for two main reasons. First, BT Mesh network facilitates many-to-many communication and therefore provides immunity against single-point-of-failure. Second, most of the BT Mesh devices can be made battery powered, thus they can withstand the main power outage. The solution proposed in [27] uses mesh devices together with mobile devices. The basic concept behind the system is that a mesh network that connects the nodes and mobile devices such as phones will communicate even when there is no main power supply and no Internet. A proof-of-concept implementation was performed using a test bed consisting of RuuviTags [36] sensors, Nordic Semiconductor nRF52840 USB Dongles [37], Raspberry Pi 3 nodes based on the Broadcom BCM2837B0 SoC, and smartphones Nexus 6P running Android version 8.1.0. The implementation in [27] was evaluated in terms of response time and packet-loss-rate. It was shown in [27] that the response time and packet-loss-rate were relatively lower. The biggest challenge in using the proposed method in [27] is that, generally, the system needs to operate where Wi-Fi signal interference may be higher.

3.1.5. Smart Factory

For a smooth operation of a smart factory, it is very important to have a reliable, efficient, and secure communication system, as a smart factory is a highly digitized and connected production facility. The primary goal of the work presented in [28] was to develop a mechanism that can provide efficient, reliable, and secure communication in a smart factory environment. The main functionalities of the proposed work were to have a mesh sensor network to collect the data, facilitate downstream communication between IoT devices to the sensors, and assist secure communication that can guarantee data authenticity and integrity. A small scaled version of the proposed concept in [28] was implemented using Raspberry Pis with nRF52840 DK, which were powered by ARM Cortex-M4F CPUs.

3.1.6. Smart Parking

A BT Mesh network based smart parking system was developed in [30]. The primary motive behind the proposed work was to enhance the utilization of parking lots without using expensive technologies that require more power. The key component of a smart parking system is to easily and accurately identify the available parking lots. Authenticated nodes, referred to as sensor platforms, were placed in the parking lots. These nodes listened for broadcasts from a custom BLE beacon found in each parking vehicle in the lot. The nearby nodes gathered the received signal strength indication (RSSI) values from broadcasts. For the purpose of security, these RSSI values were encrypted and sent to their corresponding central node. By analyzing these RSSI values, the central node performed the prediction. The central node used an optimized random forest machine learning algorithm for prediction. In addition to the RSSI values, the machine learning algorithm also used features such as the average and median of RSSI values for a given time interval. In this work, BT Mesh network not only provided a large coverage area but also made the system robust against single-point-of-failure. The proposed system is depicted in Figure 5.
Figure 5. The overall structure of the smart parking system proposed in [30], where “N” and “CN” denote a node and a central node, respectively.
It was shown in [30] that the low power and low cost localization system proposed to identify the parking lot occupancy achieved detection accuracy of approximately 70%.
The findings of the above selected work are summarised in Table 2. Note that from the selected work, only those with experimental evaluation data (such as setup, metrics) are included in Table 2.
Table 2. Validated Bluetooth Mesh applications discussed in related work.

3.2. How BT Mesh Can Support IoT Application Requirements

This section explores the feasibility of utilising BT Mesh in IoT applications considering seven requirement areas. As shown in Figure 6, the seven key IoT requirements of scalability, flexible configuration, robustness, responsiveness, integrated functionality, security, and energy efficiency are mapped with BT Mesh capabilities, as described below.
Figure 6. IoT application requirements mapped with BT Mesh features and challenges.
1.
Scalability: Scalability refers to a system’s ability to handle growing amounts of work. IoT systems will need to be scalable in varying degrees, depending on the application context. For example, a wireless lighting system in an underground tunnel will need to cater to thousands of nodes, spread across a large geographical area, whereas the IoT devices in a smart home system will most likely consist of hundreds of nodes situated within a comparably smaller geographical area. BT Mesh can be used to cater to both extremes, due to the large number of nodes it can accommodate (32,000 nodes and 127 hops per packet at maximum, according to specs, although this will be lower in practice). Due to its mesh topology, BT Mesh can also cover an extended area. However, BT Mesh’s mechanism of controlled-flooding can cause the “broadcast storm” issue [6], where increased node saturation amounts to increased packet collisions, which poses a challenge for scaling up [24].
2.
Flexible Configuration: For some IoT systems, it is essential to be able to support node configurations on the fly. There could be requirements to dynamically move nodes or to allocate nodes to different groups. Due to the mesh structure, BT Mesh networks can self-form and self-heal, which also provides fault-tolerance. BT Mesh standard supports dynamic assignment of the group and virtual addresses so that the physical network structure can be dynamically updated [7]. However, this method of dynamic group allocation using the publish–subscribe model also presents bottlenecks when a large number of nodes need to send acknowledgements of messages received to a single group owner [38]. For example, consider an IoT application for an underground mine where a controller node needs to send a mission-critical message (such as a notification to vacate an area due to a flammable gas leak) to hundreds of nodes. In this context, it is critical for the group owner to know whether the message has been received. However, because all of the hundreds of nodes in the group would be attempting to send their acknowledgements to the group owner at the same time, the network must manage high traffic, and there is a high probability of packet losses. A solution was experimentally implemented by Pierleoni et al. [38], where the acknowledgements are sent with a random delay to avoid simultaneous transmission, as suggested in the BT Mesh spec [39].
3.
Robustness: Kitchenham et al. [40] defines robustness as “the degree to which a system or component can function correctly in the presence of invalid inputs or stressful environmental conditions”. In the context of IoT systems, considering the many heterogeneous devices interconnected together via various connection mediums, there is a high possibility of system errors occurring [41]. In some cases, failures in the system can be critical and even life-threatening, such as in autonomous vehicle control. BT Mesh provides fault-tolerance in the network due to its mesh topology that enables path diversity and its managed flooding [5]. However, although more fault-tolerant, the redundant transmissions mean that it is less efficient than single-path routing [5]. It is up to the developers to configure the degree of flooding according to the application context.
4.
Responsiveness: IoT apps that involve human interactions require low latency so that the system can provide a quick reaction to fulfill human expectations. In particular, IETF RFC 5826 specifies interaction as real-time when the latency is below 500 ms [42]. BT Mesh can support this requirement, depending on the number of hops to reach the destination and if the nodes involve LPNs. Typically, in BT Mesh, each hop can take between 1 ms and 20 ms [5], unless the destination nodes are LPNs, in which case there can be additional delays, as LPNs can only receive data after polling its friend node/s. Developers can control latency by adjusting the BT Mesh parameters of advertising events and scanning events timing [6]; however, this needs to be balanced with implications for network robustness.
5.
Integrated Functionality: IoT applications typically integrate multiple sensing, processing, connectivity, and actuating elements [43,44]. For example, integration of BLE beacons, mobile apps, wearables, and other IoT devices can provide localization, proximity detection, and activity sensing capabilities in numerous application areas, such as marketing, health monitoring, museum guiding, smart homes and offices, and warehouses [45]. Hence, it is particularly advantageous to use BT Mesh, which allows integrated functionality via its Models feature, which makes it easier to include custom features. For example, a BT Mesh lighting system can be embedded with other features, such as wireless lights also functioning as BLE beacons, or integrated with occupancy sensors [7]. A challenge is a limited payload available in messages used in BT Mesh models, which limits communication throughput. However, this may be alleviated to a considerable amount using pointers to other packets, i.e., packet chains [4].
6.
Security: IoT architecture consists of components at the physical device layer, communication layer, and interfaces/services layer. This exposes IoT applications to attackers taking advantage of vulnerabilities in all these layers [46,47]. When considering security at the communication layer, BT Mesh has been designed with security as a first class citizen. Nodes in BT Mesh are provisioned using 256-bit elliptic curves and out-of-band authentication. To encrypt and authenticate the messages themselves, AES-CCM with 128-bit keys are used. Mesh operations and communications are secured via Network Key (to secure messages in nodes in the same network), Device Key (unique to each node, used to encrypt configuration messages), and Application Key (to encrypt and decrypt application data) [5,48]. According to the BT Mesh standard [39] the aforementioned security measures can provide protection against most threats against mesh networks. However, there are still vulnerabilities; device and application keys can be stolen/recovered by hardware exploitation and be susceptible to attacks such as simple power analysis, differential power analysis, and fault attack [49]. Other possible threats include malformation of the TTL value of packets [50] and exploiting “friend” nodes that lead to denial-of-service and impersonation attacks [51].
7.
Energy Efficiency: Due to the limited battery power of hardware elements and the large number of devices involved in some cases, the need to conserve energy is important for IoT systems [52]. BT Mesh inherently supports this requirement via its BLE technology. The Upper Transport layer in BT Mesh protocol stack (See Figure 2) provides support for energy-constrained LPNs (see Section 2.1.2). LPNs are able to operate at reduced duty cycles with minimized usage of radio, with the help of nearby “friend nodes” (see Section 2.1.3). In addition, users can configure the TTLs to control the maximum hops per message, which acts as another energy conservation measure by ensuring messages are not relayed further than required [5,7]. Although flooding can be controlled via the TTL values, it is still more energy draining than routing, and the developers need to fine-tune the number of relay nodes and transmissions in a BT Mesh network to avoid unnecessary energy use. Moreover, LPNs are unable to act as relay nodes because relay nodes need to be in continuous scanning mode [4]. Hence, perhaps unsurprisingly, an experimental comparison of BT Mesh with 6BLEMesh has found 6BLEMesh to be more energy efficient for a given latency target [5] (see Section 5.1). To alleviate some of the aforementioned energy issues of flooding, the work in [53] proposed a simplified ContikiMAC mechanism [54], which lowers the receiving duty cycle, and by limiting the number of forwarded packets. In another study [55], the authors presented a strategy to reduce energy consumption in the friendship mechanism with burst transmissions and listen before transmit (BTLBT), showing a 19.81% improvement in a lifetime.

6. Experiments in Group Messages

Although some related work has mentioned BT Mesh’s group messaging capability, there are very few data and little analysis from actual experimental investigations (see Section 5). Hence the group messaging behaviour in BT Mesh networks and its implications for scalability and reliability are not very well understood. To investigate this, in this section, we present our findings from a set of experiments examining the effect of managed flooding in group messaging in BT Mesh.

6.1. Experiment Setup

Ten BT Mesh nodes and one gateway device were used in this experiment. The nodes were provisioned into the Bluetooth Mesh network and added to the same group. Three different tests with varying node proximity were conducted. The initial TTL value was set at 4. In each test, LED ON/OFF group messages were sent to the network, and time and debug messages were recorded through the host computer via the gateway device. The sent time in the group message and acknowledgement received time in each node were recorded. This was repeated ten times for each test. The LED ON/OFF state on each node was also visually observed to make sure that the group message was received by the node.
  • Test 1: The nodes and the gateway device were set up in close proximity ( 1–5 cm between each other), and group messages were sent to the nodes.
  • Test 2: The nodes and the gateway device were set up with approximately 10 m distance between each node and the gateway (in a star topology), and group messages were sent to the nodes.
  • Test 3: The nodes and the gateway device were set up approximately 10 m between nodes and the gateway in a linear arrangement, and group messages were sent to the nodes.
Figure 8 shows the topologies of the three tests.
Figure 8. Setup of group messaging experiments.

6.2. Experimental Results

We examined the TTL values in the experiment logs for each message transfer in each node to find out the transmission path. In all tests, the TTL values varied between 2 and 4, which reflects the number of hops in the transmission path. In most cases, the messages were sent directly to the gateway. However, surprisingly, even in Test 1, when each node was at most 5 cm from the gateway, some acknowledgment messages only reached the gateway via other nodes, hence taking a longer path. This pattern was prevalent throughout the three tests (ranging from 5% to 11%). Another interesting observation was the amount of dropped acknowledgments. In Test 1, the gateway received 91% of the acknowledgments from the group nodes, even though it was observed that the message was received by the node (by visually verifying the LED state). This value dropped to 78% in Test 2 and 63% in Test 3, even though the messages were received by the nodes.

6.3. Discussion

The cause of messages taking a longer path can be explained by BT Mesh’s managed-flooding, which causes messages to follow multiple paths, rather than a set route (see Section 2). This behaviour is “managed” by the heartbeat and TTL mechanisms. The impact of taking a longer path depends on how time-sensitive the system is. Although the effect of this behaviour in the experiment with 10 nodes was negligible, it will be interesting to investigate the impact at a larger scale. The case of missing acknowledgments corroborates another experimental study by Pierleoni et al. [38]. In fact, the root cause of this behaviour lies in the BLE simultaneous advertising when multiple nodes send data to the same receiver at the same time [59]. For example, if two nodes transmit two messages roughly simultaneously (where the time difference between the two transmission events is within 0.1 s–1 s) there is a potential for packet collision, leading to the loss of the message. As evident by our test results, the acknowledgment packet loss seems to be further amplified by the distance between nodes. This behaviour can be a serious concern in applications where it is critical to know whether a message has been received (see Section 3.2).

8. Conclusions and Future Directions

BT Mesh is an emerging technology that can support IoT environments with reliable communications. This paper provides an overview of BT Mesh that includes a brief description of the elements in BT Mesh protocol stack and details about different node types. The real-life implementation of BT Mesh are also presented with its performance. Further, the suitability of BT Mesh to IoT applications is discussed in terms of scalability, flexibility, robustness, responsiveness, integrated functionality, security, and energy efficiency. To give the readers the pros and cons of BT Mesh over other communication technologies, we have provided a comparison of BT Mesh with technologies such as Wi-Fi, Z-Wave, Zigbee, and LTE-M. To find the effect of managed flooding in group messaging in BT Mesh, we performed experiments and reported our findings. In addition, this paper also discusses current challenges related to BT Mesh with some avenues for addressing them. Analysis of current state-of-the-art applications implemented using BT Mesh demonstrate the applicability of BT Mesh technology in many types of IoT applications in various domains. However, much work still remains.
BT Mesh uses several performance influencing parameters/functions such as time-to-live (TTL) and relay features. The feature configuration and parameter selection can have a huge impact on the performance of the BT Mesh network, such as a reduction in reliability and higher energy consumption. Further work is required to experimentally understand the effect of different parameter settings on performance, reliability, and energy consumption in various settings.
BT Mesh is useful for a collection of nodes within close range to inter-connect or to perform proximity sensing and localization for limited bandwidth operations; further studies on how varying mobility situations (e.g., speeds and types of mobility) might affect performance and robustness in harsh environments are still needed, e.g., as our experiments show that a node receives some of its messages from other nodes instead of directly from the sender node suggests a robustness mechanism, so that if multiple copies of a message are sent through the mesh network and some nodes move out of immediate range of a node, a node can still receive the message from remaining in-range nodes.
A wider range of applications together with best practices for BT Mesh can be explored even as the technology is deployed in more applications; this can lead to, first, best practices and parameter settings for the deployment of a BT Mesh for a certain environment and application domain to achieve best performance (including, for example, how many nodes for coverage of a certain area with particular features with redundancy for robustness, the topology in which the nodes should be connected, the transmission properties for maximizing the lifetime of nodes or the network, the configuration for minimizing energy use, and so on), and second, to subsequent recommendations for future BT Mesh developments.
BT Mesh embedding is another interesting direction, where nodes are embedded into everyday things and into common structures (e.g., within walls of a place or in a construction site), lighting systems in a building to street furniture and (instrumented) everyday objects and appliances in the home for smart home applications, or in factories and commercial places (e.g., health monitoring or aged care); such embedding can allow “ubiquitous connectivity” among everyday things but will need to be studied with trade-offs in maintenance over long periods, operational costs, and benefits.

Author Contributions

Conceptualization, N.F., S.W.L. and C.W.; methodology, N.F., S.W.L., I.N. and C.W.; validation, N.F. and C.W.; investigation, I.N. and N.F.; resources, C.W.; writing—original draft preparation, I.N., N.F., S.W.L. and C.W.; writing—review and editing, N.F., I.N. and C.W.; project administration, N.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Baert, M.; Rossey, J.; Shahid, A.; Hoebeke, J. The bluetooth mesh standard: An overview and experimental evaluation. Sensors 2018, 18, 2409. [Google Scholar] [CrossRef] [PubMed]
  2. Yin, J.; Yang, Z.; Cao, H.; Liu, T.; Zhou, Z.; Wu, C. A survey on Bluetooth 5.0 and mesh: New milestones of IoT. ACM Trans. Sens. Netw. (TOSN) 2019, 15, 1–29. [Google Scholar] [CrossRef]
  3. Ghori, M.R.; Wan, T.C.; Sodhy, G.C. Bluetooth low energy mesh networks: Survey of communication and security protocols. Sensors 2020, 20, 3590. [Google Scholar] [CrossRef] [PubMed]
  4. Hernandez-Solana, A.; Perez-Diaz-De-Cerio, D.; García-Lozano, M.; Bardaji, A.V.; Valenzuela, J.L. Bluetooth Mesh Analysis, Issues, and Challenges. IEEE Access 2020, 8, 53784–53800. [Google Scholar] [CrossRef]
  5. Darroudi, S.M.; Gomez, C.; Crowcroft, J. Bluetooth low energy mesh networks: A standards perspective. IEEE Commun. Mag. 2020, 58, 95–101. [Google Scholar] [CrossRef]
  6. Rondón, R.; Mahmood, A.; Grimaldi, S.; Gidlund, M. Understanding the performance of bluetooth mesh: Reliability, delay, and scalability analysis. IEEE Internet Things J. 2020, 7, 2089–2101. [Google Scholar] [CrossRef]
  7. Woolley, M.; Schmidt, S. Bluetooth Mesh Networking: Paving the Way for Smart Lighting. 2017. Available online: https://www.bluetooth.com/bluetooth-resources/bluetooth-mesh-paving-the-way-for-smart-lighting/ (accessed on 27 October 2022).
  8. Karlsson, S. A Data Collection Framework for Bluetooth Mesh Networks. Master’s Thesis, Department of Computer and Information Science, Linköping University, Linköping, Sweden, 2019. [Google Scholar]
  9. Xia, N.; Chen, H.H.; Yang, C.S. Emerging technologies for machine-type communication networks. IEEE Netw. 2019, 34, 214–222. [Google Scholar] [CrossRef]
  10. Tekler, Z.D.; Low, R.; Gunay, B.; Andersen, R.K.; Blessing, L. A scalable Bluetooth Low Energy approach to identify occupancy patterns and profiles in office spaces. Build. Environ. 2020, 171, 106681. [Google Scholar] [CrossRef]
  11. Esrafilian-Najafabadi, M.; Haghighat, F. Occupancy-based HVAC control systems in buildings: A state-of-the-art review. Build. Environ. 2021, 197, 107810. [Google Scholar] [CrossRef]
  12. Jürgens, M.; Meis, D.; Möllers, D.; Nolte, F.; Stork, E.; Vossen, G.; Werner, C.; Winkelmann, H. Bluetooth Mesh Networks for Indoor Localization. In Proceedings of the 2019 20th IEEE International Conference on Mobile Data Management (MDM), Hong Kong, China, 10–13 June 2019; pp. 397–402. [Google Scholar] [CrossRef]
  13. Montecchiari, L.; Trotta, A.; Bononi, L.; Di Felice, M. Bluetooth Mesh Technology for the Joint Monitoring of Indoor Environments and Mobile Device Localization: A Performance Study. In Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2022; pp. 193–199. [Google Scholar] [CrossRef]
  14. Tong, X.; Wang, L.; Cui, Y. Research on Indoor Positioning Based on Smart Home Bluetooth Networking. In Proceedings of the 2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT), Yichang, China, 16–18 September 2022; pp. 1–4. [Google Scholar] [CrossRef]
  15. Martínez, C.; Eras, L.; Domínguez, F. The Smart Doorbell: A proof-of-concept Implementation of a Bluetooth Mesh Network. In Proceedings of the 2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM), Cuenca, Ecuador, 15–19 October 2018; pp. 1–5. [Google Scholar]
  16. Taştan, S.İ.; Dalkiliç, G. Smart Home System Using Internet of Things Devices and Mesh Topology. In Proceedings of the 2021 6th International Conference on Computer Science and Engineering (UBMK), Ankara, Turkey, 15–17 September 2021; pp. 407–412. [Google Scholar] [CrossRef]
  17. Tran, Q.T.; Tran, D.D.; Doan, D.; Nguyen, M.S. An Approach of BLE Mesh Network For Smart Home Application. In Proceedings of the 2020 International Conference on Advanced Computing and Applications (ACOMP), Quy Nhon, Vietnam, 25–27 November 2020; pp. 170–174. [Google Scholar] [CrossRef]
  18. Dvoynikov, V.M.; Smirnov, V.A.; Burilov, D.A. Comparative Analysis of Mesh and Thread Networks and their Application Possibility in the "Smart Home" Systems. In Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Russia, 26–29 January 2021; pp. 8–11. [Google Scholar] [CrossRef]
  19. Sergi, I.; Montanaro, T.; Gammariello, M.C.; Patrono, L. The use of Bluetooth Mesh Networking in IoT-aware Applications. In Proceedings of the 2021 6th International Conference on Smart and Sustainable Technologies (SpliTech), Bol and Split, Croatia, 8–11 September 2021; pp. 01–06. [Google Scholar]
  20. Zheng, X.; Xue, S.; Cao, H.; Wang, F.; Zhang, M. A cost-efficient smart IoT device controlling system based on bluetooth mesh and cloud computing. In Proceedings of the 2020 Chinese Automation Congress (CAC), Shanghai, China, 6–8 November 2020; pp. 3374–3379. [Google Scholar]
  21. Lee, T.Y.; Truong, P.H.; Lee, C.K.; Jeong, G.M. Range extension of LED control systems using a Bluetooth mesh network. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 8–10 January 2017; pp. 166–167. [Google Scholar]
  22. Abboud, K.; Li, Y.; Bermudez, S. eSNAP: Enabling Sensor Network Automatic Positioning in IoT Lighting Systems. IEEE Internet Things J. 2020, 7, 10427–10436. [Google Scholar] [CrossRef]
  23. Veiga, A.A.; Abbas, C.J. Proposal and application of Bluetooth mesh profile for smart cities’ services. Smart Cities 2018, 2, 1–19. [Google Scholar] [CrossRef]
  24. De Leon, E.; Nabi, M. An experimental performance evaluation of bluetooth mesh technology for monitoring applications. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Republic of Korea, 25–28 May 2020; pp. 1–6. [Google Scholar]
  25. Dvoynikov, V.M.; Smirnov, V.A.; Burylov, D.A. Implementation of a Monitoring System for an Electrical Network Based on a Contactless Temperature Sensor and a Hall Effect Current Sensor. In Proceedings of the 2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Saint Petersburg, Russia, 25–28 January 2022; pp. 604–607. [Google Scholar]
  26. Witham, O.; Johnston, L.N.; Xiao, M.; Feng, J.; Zhou, N.; Shaker, G. Batteryless wireless water leak detection system. In Proceedings of the 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), Sharm El Sheikh, Egypt, 17–19 December 2019; pp. 1–4. [Google Scholar]
  27. Álvarez, F.; Almon, L.; Radtki, H.; Hollick, M. Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh. In Proceedings of the 2019 IEEE Global Humanitarian Technology Conference (GHTC), Seattle, WA, USA, 17–20 October 2019; pp. 1–8. [Google Scholar]
  28. Yang Lam, T.C.; Ling Yew, S.S.; Keoh, S.L. Bluetooth Mesh Networking: An Enabler of Smart Factory Connectivity and Management. In Proceedings of the 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan, 18–20 September 2019; pp. 1–6. [Google Scholar]
  29. Garrido-Hidalgo, C.; Hortelano, D.; Roda-Sanchez, L.; Olivares, T.; Ruiz, M.C.; Lopez, V. IoT heterogeneous mesh network deployment for human-in-the-loop challenges towards a social and sustainable Industry 4.0. IEEE Access 2018, 6, 28417–28437. [Google Scholar] [CrossRef]
  30. Seymer, P.; Wijesekera, D.; Kan, C. Secure Outdoor Smart Parking Using Dual Mode Bluetooth Mesh Networks. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–7. [Google Scholar]
  31. Seymer, P.; Wijesekera, D.; Kan, C.D. Smart Parking Zones Using Meshed Bluetooth Sensor Networks. In Proceedings of the International Conference on Smart Cities and Green ICT Systems, International Conference on Vehicle Technology and Intelligent Transport Systems; Springer: Cham, Switzerland, 2021; pp. 245–269. [Google Scholar]
  32. Al Dakheel, J.; Del Pero, C.; Aste, N.; Leonforte, F. Smart buildings features and key performance indicators: A review. Sustain. Cities Soc. 2020, 61, 102328. [Google Scholar] [CrossRef]
  33. Akkaya, K.; Guvenc, I.; Aygun, R.; Pala, N.; Kadri, A. IoT-based occupancy monitoring techniques for energy-efficient smart buildings. In Proceedings of the 2015 IEEE Wireless communications and networking conference workshops (WCNCW), New Orleans, LA, USA, 9–12 March 2015; pp. 58–63. [Google Scholar]
  34. Füchtenhans, M.; Grosse, E.H.; Glock, C.H. Smart lighting systems: State-of-the-art and potential applications in warehouse order picking. Int. J. Prod. Res. 2021, 59, 3817–3839. [Google Scholar] [CrossRef]
  35. Chew, I.; Karunatilaka, D.; Tan, C.P.; Kalavally, V. Smart lighting: The way forward? Reviewing the past to shape the future. Energy Build. 2017, 149, 180–191. [Google Scholar] [CrossRef]
  36. Ruuvi Innovations Ltd. Available online: https://ruuvi.com/ruuvitag-specs/ (accessed on 27 January 2023).
  37. Nordic Semiconductor Inc. nRF52840 Dongle Mannual. Available online: https://www.nordicsemi.com/-/media/Software-and-other-downloads/Product-Briefs/nRF52840-Dongle-product-brief.pdf (accessed on 20 January 2022).
  38. Pierleoni, P.; Gentili, A.; Mercuri, M.; Belli, A.; Garello, R.; Palma, L. Performance Improvement on Reception Confirmation Messages in Bluetooth Mesh Networks. IEEE Internet Things J. 2021, 9, 2056–2070. [Google Scholar] [CrossRef]
  39. Bluetooth SIG Inc. Mesh Profile 1.0.1. 2019. Available online: https://www.bluetooth.com/specifications/specs/mesh-profile-1-0-1/ (accessed on 27 October 2022).
  40. Kitchenham, B.; Brereton, O.P.; Budgen, D.; Turner, M.; Bailey, J.; Linkman, S. Systematic literature reviews in software engineering–a systematic literature review. Inf. Softw. Technol. 2009, 51, 7–15. [Google Scholar] [CrossRef]
  41. Xing, L. Reliability in Internet of Things: Current status and future perspectives. IEEE Internet Things J. 2020, 7, 6704–6721. [Google Scholar] [CrossRef]
  42. Brandt, A.; Buron, J.; Porcu, G. Home Automation Routing Requirements in Low-Power and Lossy Networks. 2010. Available online: https://www.rfc-editor.org/rfc/rfc5826 (accessed on 27 October 2022).
  43. Ibarra-Esquer, J.E.; González-Navarro, F.F.; Flores-Rios, B.L.; Burtseva, L.; Astorga-Vargas, M.A. Tracking the evolution of the internet of things concept across different application domains. Sensors 2017, 17, 1379. [Google Scholar] [CrossRef]
  44. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
  45. Jeon, K.E.; She, J.; Soonsawad, P.; Ng, P.C. BLE beacons for internet of things applications: Survey, challenges, and opportunities. IEEE Internet Things J. 2018, 5, 811–828. [Google Scholar] [CrossRef]
  46. Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar]
  47. Balliu, M.; Bastys, I.; Sabelfeld, A. Securing IoT Apps. IEEE Secur. Priv. 2019, 17, 22–29. [Google Scholar] [CrossRef]
  48. Lacava, A.; Zottola, V.; Bonaldo, A.; Cuomo, F.; Basagni, S. Securing Bluetooth Low Energy networking: An overview of security procedures and threats. Comput. Netw. 2022, 211, 108953. [Google Scholar] [CrossRef]
  49. Adomnicai, A.; Fournier, J.J.; Masson, L. Hardware security threats against Bluetooth mesh networks. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June 2018; pp. 1–9. [Google Scholar]
  50. Krzysztoń, M.; Marks, M. Simulation of watchdog placement for cooperative anomaly detection in bluetooth mesh intrusion detection system. Simul. Model. Pract. Theory 2020, 101, 102041. [Google Scholar] [CrossRef]
  51. Álvarez, F.; Almon, L.; Hahn, A.S.; Hollick, M. Toxic friends in your network: Breaking the bluetooth mesh friendship concept. In Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, 11 November 2019; pp. 1–12. [Google Scholar]
  52. Kaur, N.; Sood, S.K. An energy-efficient architecture for the Internet of Things (IoT). IEEE Syst. J. 2015, 11, 796–805. [Google Scholar] [CrossRef]
  53. Gotz, J.D.; Rayel, O.K.; Moritz, G.L. Improving Bluetooth Mesh Energy Efficiency Using Clustering. J. Commun. Inf. Syst. 2021, 36, 156–165. [Google Scholar] [CrossRef]
  54. Dunkels, A. The ContikiMAC Radio Duty Cycling Protocol, SICS Technical Report T2011:13 ISSN 1100-3154. Available online: http://www.dunkels.com/adam/dunkels11contikimac.pdf (accessed on 25 January 2022).
  55. Hortelano, D.; Olivares, T.; Ruiz, M.C. Reducing the energy consumption of the friendship mechanism in Bluetooth mesh. Comput. Netw. 2021, 195, 108172. [Google Scholar] [CrossRef]
  56. Romero, E.A.D.L. Experimental Performance Evaluation of the Bluetooth Mesh Protocol for Monitoring Applications. Master’s Thesis, Department of Electrical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands, 2019. [Google Scholar]
  57. Sánchez, R.C. Experimental Evaluation of Bluetooth Low Energy Mesh Networks. Master’s Thesis, Castelldefels School of Telecommunications and Aerospace Engineering, Barcelona, Spain, 2018. [Google Scholar]
  58. Brandão, A.S.; Lima, M.C.; Abbas, C.J.B.; Villalba, L.J.G. An Energy Balanced Flooding Algorithm for a BLE Mesh Network. IEEE Access 2020, 8, 97946–97958. [Google Scholar] [CrossRef]
  59. Ghamari, M.; Villeneuve, E.; Soltanpur, C.; Khangosstar, J.; Janko, B.; Sherratt, R.S.; Harwin, W. Detailed examination of a packet collision model for bluetooth low energy advertising mode. IEEE Access 2018, 6, 46066–46073. [Google Scholar] [CrossRef]
  60. Perez-Diaz-de Cerio, D.; Hernandez-Solana, A.; Garcia-Lozano, M.; Bardají, A.V.; Valenzuela, J.L. Speeding up bluetooth mesh. IEEE Access 2021, 9, 93267–93284. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.