A Survey on Bluetooth 5.0 and Mesh

Ubiquitous connectivity among objects is the future of the coming Internet of Things era. Technologies are competing fiercely to fulfill this goal, but none of them can fit into all application scenarios. However, efforts are still made to expand application ranges of certain technologies. Shortly after the adoption of its newest version, Bluetooth 5.0, the Bluetooth Special Interest Group released another new specification on network topology: Bluetooth Mesh. Combined together, those two bring Bluetooth to a brand new stage. However, current works related to it only focus on part of the new Bluetooth, and discussion over the entire one is lacking. Therefore, in this survey, we conduct an investigation toward the new Bluetooth from a comprehensive perspective. Through this, we show that the new Bluetooth not only consolidates its strengths in original application fields but also brings alterations and opportunities to new ones, making it a strong competitor in the future for providing complete solutions to meet the demands of seamless communications in the Internet of Things area.

[1]  Jurgen Sieck,et al.  Location-Based Services with iBeacon Technology , 2014, 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation.

[2]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[3]  Yunhao Liu,et al.  Towards Energy Efficient Duty-Cycled Networks: Analysis, Implications and Improvement , 2016, IEEE Transactions on Computers.

[4]  N. Baker,et al.  ZigBee and Bluetooth strengths and weaknesses for industrial applications , 2005 .

[5]  Praneeth Juturu,et al.  Demo: A Connection Oriented Mesh Network for Mobile Devices using Bluetooth Low Energy , 2015, SenSys.

[6]  Zhidong Deng,et al.  Application-oriented wireless sensor network communication protocols and hardware platforms: A survey , 2008, 2008 IEEE International Conference on Industrial Technology.

[7]  Irfan Oksar,et al.  A Bluetooth signal strength based indoor localization method , 2014, IWSSIP 2014 Proceedings.

[8]  Arindam Mukherjee,et al.  A Survey of Communications and Networking Technologies for Energy Management in Buildings and Home Automation , 2012, J. Comput. Networks Commun..

[9]  Scott F. Midkiff,et al.  An analysis of Bluetooth security vulnerabilities , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[10]  Yunhao Liu,et al.  From RSSI to CSI , 2013, ACM Comput. Surv..

[11]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[12]  Yuan Zhou,et al.  Advances in IEEE 802.11ah standardization for machine-type communications in sub-1GHz WLAN , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[13]  Matthew S. Reynolds,et al.  BLE-Backscatter: Ultralow-Power IoT Nodes Compatible With Bluetooth 4.0 Low Energy (BLE) Smartphones and Tablets , 2017, IEEE Transactions on Microwave Theory and Techniques.

[14]  Chenshu Wu,et al.  Automatic Radio Map Adaptation for Indoor Localization Using Smartphones , 2018, IEEE Transactions on Mobile Computing.

[15]  Carles Gomez,et al.  Bluetooth Low Energy Mesh Networks: A Survey , 2017, Sensors.

[16]  Ju Wook Jang,et al.  BLEmesh: A Wireless Mesh Network Protocol for Bluetooth Low Energy Devices , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.

[17]  Yunhao Liu,et al.  PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing , 2017, IEEE Transactions on Mobile Computing.

[18]  Yunhao Liu,et al.  Smartphones Based Crowdsourcing for Indoor Localization , 2015, IEEE Transactions on Mobile Computing.

[19]  Lucia Lo Bello,et al.  A Bluetooth Low Energy real-time protocol for Industrial Wireless mesh Networks , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.

[20]  Sofie Pollin,et al.  Bluetooth now or low energy: Should BLE mesh become a flooding or connection oriented network? , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[21]  Hector Jose Perez Iglesias,et al.  Indoor person localization system through RSSI Bluetooth fingerprinting , 2012, 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP).

[22]  Wee-Seng Soh,et al.  A Comprehensive Study of Bluetooth Signal Parameters for Localization , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[23]  Antony I. T. Rowstron,et al.  An empirical study of flooding in mesh networks , 2009, SIGMETRICS Perform. Evaluation Rev..

[24]  Farzad Samie,et al.  IoT technologies for embedded computing: A survey , 2016, 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[25]  Jeroen Hoebeke,et al.  The Bluetooth Mesh Standard: An Overview and Experimental Evaluation , 2018, Sensors.

[26]  Yunhao Liu,et al.  Non-Invasive Detection of Moving and Stationary Human With WiFi , 2015, IEEE Journal on Selected Areas in Communications.

[27]  Dai Davis Feature: Bluetooth , 2002 .

[28]  Konstantin Mikhaylov,et al.  Experimental Performance Evaluation of BLE 4 Versus BLE 5 in Indoors and Outdoors Scenarios , 2018, Advances in Body Area Networks I.

[29]  Sheng Tan,et al.  WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition , 2016, MobiHoc.

[30]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[31]  Ozan K. Tonguz,et al.  Bluetooth 5: A Concrete Step Forward toward the IoT , 2017, IEEE Communications Magazine.

[32]  Yunhao Liu,et al.  Locating in fingerprint space: wireless indoor localization with little human intervention , 2012, Mobicom '12.

[33]  Christian Gehrmann,et al.  Bluetooth™ Security White Paper Bluetooth SIG Security Expert Group, , 2002 .

[34]  Mo Li,et al.  Precise Power Delay Profiling with Commodity Wi-Fi , 2015, IEEE Transactions on Mobile Computing.

[35]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[36]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.