Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2020 Jun 25;20(12):3590.
doi: 10.3390/s20123590.

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

Affiliations
Review

Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

Muhammad Rizwan Ghori et al. Sensors (Basel). .

Abstract

Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks.

Keywords: BLE; IoT security; bluetooth low energy; wireless mesh networks.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Bluetooth Low Energy (BLE) Mesh System Architecture [17].
Figure 2
Figure 2
Classification of BLE Communication Protocols.
Figure 3
Figure 3
Cluster-based On Demand Routing Protocol [10].
Figure 4
Figure 4
MRT-BLE [11].
Figure 5
Figure 5
BLE MN Smart Cargo [59].
Figure 6
Figure 6
Wireless Personal Area Network (WPAN) Attack Vectors.
Figure 7
Figure 7
SweynTooth BLE Exploits.
Figure 8
Figure 8
Intrusion Detection Systems (IDS) for related WSN technologies.

References

    1. Ghori M.R., Wan T.C., Sodhy G.C. Advances in Cyber Security. Volume 1132. Springer; Singapore: 2020. Bluetooth Low Energy 5 Mesh Based Hospital Communication Network (B5MBHCN) pp. 247–261.
    1. Darroudi S.M., Gomez C. Bluetooth Low Energy Mesh Networks: A Survey. Sensors. 2017;17:1467. doi: 10.3390/s17071467. - DOI - PMC - PubMed
    1. Gohel S. Bluetooth Attendance System with Android Application for ERP; Proceedings of the International Conference on Computing, Power and Communication Technologies (GUCON); Greater Noida, India. 28–29 Septtember 2018; pp. 481–484.
    1. Sthapit P., Gang H., Pyun J. Bluetooth Based Indoor Positioning Using Machine Learning Algorithms; Proceedings of the IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia); Jeju, Korea. 24–26 June 2018; pp. 206–212.
    1. Yumantoro G., Kristalina P., Sudarsono A. Performance Evaluation of Indoor Characteristic based on Bluetooth Low Energy Communication System through Statistical Approach; Proceedings of the International Electronics Symposium on Engineering Technology and Applications (IES-ETA); Bali, Indonesia. 29–30 October 2018; pp. 189–195.