IoT Security Mechanisms in the Example of BLE

Kalinin, Evgeny and Belyakov, Danila and Bragin, Dmitry and Konev, Anton (2021) IoT Security Mechanisms in the Example of BLE. Computers, 10 (12). p. 162. ISSN 2073-431X

[thumbnail of computers-10-00162.pdf] Text
computers-10-00162.pdf - Published Version

Download (428kB)

Abstract

In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency.

Item Type: Article
Uncontrolled Keywords: Bluetooth mesh; BLE; security; IoT
Subjects: SCI Archives > Computer Science
Depositing User: Managing Editor
Date Deposited: 10 Nov 2022 05:19
Last Modified: 10 Apr 2025 12:47
URI: http://researchers.promo4article.com/id/eprint/95

Actions (login required)

View Item
View Item