Back to Search Start Over

IoT Security Mechanisms in the Example of BLE

Authors :
Evgeny Kalinin
Danila Belyakov
Dmitry Bragin
Anton Konev
Source :
Computers, Vol 10, Iss 12, p 162 (2021)
Publication Year :
2021
Publisher :
MDPI AG, 2021.

Abstract

In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency.

Details

Language :
English
ISSN :
2073431X
Volume :
10
Issue :
12
Database :
Directory of Open Access Journals
Journal :
Computers
Publication Type :
Academic Journal
Accession number :
edsdoj.750647ee732648a8bf9c442b65b07ba3
Document Type :
article
Full Text :
https://doi.org/10.3390/computers10120162