A Bluetooth Low Energy mesh network auto-configuring Proactive Source Routing protocol

Author(s):  
Julio Leon ◽  
Abel Duenas ◽  
Yuzo Iano ◽  
Cibele Abreu Makluf ◽  
Guillermo Kemper
Author(s):  
Julio León ◽  
Abel Dueñas ◽  
Cibele A. Makluf ◽  
Frank C. Cabello ◽  
Guillermo Kemper ◽  
...  

Author(s):  
Muhammad Rizwan Ghori ◽  
Tat-Chee Wan

Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. Despite of the BLE version 5 security enhancements, viable IDS solutions for BLE Mesh networks remain a nascent research area.


Author(s):  
Shruthi Sirur ◽  
Praneeth Juturu ◽  
Hari Prabhat Gupta ◽  
Pramod Reddy Serikar ◽  
Yaswanth Kumar Reddy ◽  
...  

Author(s):  
Guillermo Kemper ◽  
Yuzo Iano ◽  
Frank C. Cabello ◽  
Cibele A. Makluf ◽  
Abel Dueñas ◽  
...  

2019 ◽  
Vol 292 ◽  
pp. 02003 ◽  
Author(s):  
Mostafa Labib ◽  
Atef Ghalwash ◽  
Sarah Abdulkader ◽  
Mohamed Elgazzar

The Bluetooth Low Energy (BLE) is an attractive solution for implementing low-cost, low power consumption, short-range wireless transmission technology and high flexibility wireless products, which working on standard coin-cell batteries for years. The original design of BLE is restricted to star topology networking, which limits network coverage and scalability. In contrast, other competing technologies like Wi-Fi and ZigBee overcome those constraints by supporting different topologies such as the tree and mesh network topologies. This paper presents a part of the researchers’ efforts in designing solutions to enable BLE mesh networks and implements a tree network topology which is not supported in the standard BLE specifications. In addition, it discusses the advantages and drawbacks of the existing BLE network solutions. During analyzing the existing solutions, we highlight currently open issues such as flooding-based and routing-based solutions to allow end-to-end data transmission in a BLE mesh network and connecting BLE devices to the internet to support the Internet of Things (IoT). The approach proposed in this paper combines the default BLE star topology with the flooding based mesh topology to create a new hybrid network topology. The proposed approach can extend the network coverage without using any routing protocol.


Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3590 ◽  
Author(s):  
Muhammad Rizwan Ghori ◽  
Tat-Chee Wan ◽  
Gian Chand Sodhy

Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks.


IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 9587-9598 ◽  
Author(s):  
Changsu Jung ◽  
Kyungjun Kim ◽  
Jihun Seo ◽  
Bhagya Nathali Silva ◽  
Kijun Han

Sign in / Sign up

Export Citation Format

Share Document