Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security

Wireless Mesh Networks (WMN) are becoming inevitable in this world of high technology as it provides low cost access to broadband services. Moreover, the technologists are doing research to make WMN more reliable and secure. Subsequently, among wireless ad-hoc networking technologies, Bluetooth Low Energy (BLE) is gaining high degree of importance among researchers due to its easy availability in the gadgets and low power consumption. BLE started its journey from version 4.0 and announced the latest version 5 with mesh support capability. BLE being a low power and mesh supported technology is nowadays among the hot research topics for the researchers. Many of the researchers are working on BLE mesh technology to make it more efficient and smart. Apart from other variables of efficiency, like all communication networks, mesh network security is also of a great concern. In view of the aforesaid, this paper provides a comprehensive review on several works associated to the security in WMN and BLE mesh networks and the research related to the BLE security protocols. Moreover, after the detailed research on related works, this paper has discussed the pros and cons of the present developed mesh security mechanisms. Also, at the end after extracting the curx from the present research on WMN and BLE mesh security, this research study has devised some solutions as how to mitigate the BLE mesh network security lapses.

[1]  Piyush Pathak,et al.  Detecting MAC Misbehavior Switching Attacks in Wireless Mesh Networks , 2011 .

[2]  Xinghua Yang,et al.  Efficient Intrusion Detection System Model in Wireless Mesh Network , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[3]  Khulumani Sibanda,et al.  Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks , 2018, 2018 Conference on Information Communications Technology and Society (ICTAS).

[4]  Shiuh-Pyng Shieh,et al.  On the security of password-based pairing protocol in Bluetooth , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.

[5]  Alexandre Adomnicai,et al.  Hardware Security Threats Against Bluetooth Mesh Networks , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[6]  M. Mosleh,et al.  Notice of Violation of IEEE Publication PrinciplesA new secure scheme purposed for recognition and authentication protocol in Bluetooth environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[7]  Stéphane Maag,et al.  Protecting Wireless Mesh Networks through a distributed intrusion prevention framework , 2015, 2015 7th IEEE Latin-American Conference on Communications (LATINCOM).

[8]  Carles Gomez,et al.  Bluetooth Low Energy Mesh Networks: A Survey , 2017, Sensors.

[9]  Xin Yu,et al.  Secure Constructing Bluetooth Scatternet Based on BTCP , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[10]  Maryline Laurent-Maknavicius,et al.  An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms , 2012, Third International Conference on Communications and Networking.

[11]  Vallipuram Muthukkumarasamy,et al.  Securing Wireless Mesh Networks , 2008, IEEE Internet Computing.

[12]  Douglas S. Reeves,et al.  Bluetooth Network-Based Misuse Detection , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).

[13]  David Hutchison,et al.  OpenLIDS: a lightweight intrusion detection system for wireless mesh networks , 2009, MobiCom '09.

[14]  Bin Yu,et al.  Security enhanced design of the Bluetooth simple pairing protocol , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[15]  Aggeliki Sgora,et al.  A survey on security and privacy issues in Wireless Mesh Networks , 2016, Secur. Commun. Networks.

[16]  Zhang Minqing,et al.  The research on certificateless hierarchical key management in wireless mesh network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[17]  Liu Ning,et al.  Securing Wireless Mesh Network with Mobile Firewall , 2010 .

[18]  Thaier Hayajneh,et al.  Security Vulnerabilities in Bluetooth Technology as Used in IoT , 2018, J. Sens. Actuator Networks.

[19]  Zhuo Chen,et al.  Probability Based IDS Towards Secure WMN , 2010, 2010 2nd International Workshop on Intelligent Systems and Applications.

[20]  Abdulghani Ali Ahmed,et al.  Review of Access Control Mechanisms in Cloud Computing , 2018 .