Visible to the public Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security

TitleReview on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
Publication TypeConference Paper
Year of Publication2019
AuthorsGhori, Muhammad Rizwan, Wan, Tat-Chee, Anbar, Mohammed, Sodhy, Gian Chand, Rizwan, Amna
Conference Name2019 IEEE Student Conference on Research and Development (SCOReD)
Date PublishedOct. 2019
PublisherIEEE
ISBN Number978-1-7281-2613-5
Keywordsad-hoc networking technologies, BLE, BLE mesh network security mechanisms, BLE security protocols, Bluetooth, bluetooth low energy, Bluetooth low energy mesh network technology, bluetooth security, Communication networks, composability, Cyber physical system, cyber physical systems, Human Behavior, low power consumption, MESH network, mesh support capability, Protocols, pubcrawl, resilience, Resiliency, security, telecommunication security, Wireless, Wireless Mesh Network Security, wireless mesh networks, WMN
Abstract

Wireless Mesh Networks (WMN) are becoming inevitable in this world of high technology as it provides low cost access to broadband services. Moreover, the technologists are doing research to make WMN more reliable and secure. Subsequently, among wireless ad-hoc networking technologies, Bluetooth Low Energy (BLE) is gaining high degree of importance among researchers due to its easy availability in the gadgets and low power consumption. BLE started its journey from version 4.0 and announced the latest version 5 with mesh support capability. BLE being a low power and mesh supported technology is nowadays among the hot research topics for the researchers. Many of the researchers are working on BLE mesh technology to make it more efficient and smart. Apart from other variables of efficiency, like all communication networks, mesh network security is also of a great concern. In view of the aforesaid, this paper provides a comprehensive review on several works associated to the security in WMN and BLE mesh networks and the research related to the BLE security protocols. Moreover, after the detailed research on related works, this paper has discussed the pros and cons of the present developed mesh security mechanisms. Also, at the end after extracting the curx from the present research on WMN and BLE mesh security, this research study has devised some solutions as how to mitigate the BLE mesh network security lapses.

URLhttps://ieeexplore.ieee.org/document/8896310
DOI10.1109/SCORED.2019.8896310
Citation Keyghori_review_2019