{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:35:42Z","timestamp":1760236542209,"version":"build-2065373602"},"reference-count":38,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Digital Development, Communications and Mass Media of the Russian Federation and Russian Venture Company (RVC JSC)","award":["Agreement \u2116009\/20 dated 04\/10\/2020"],"award-info":[{"award-number":["Agreement \u2116009\/20 dated 04\/10\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency.<\/jats:p>","DOI":"10.3390\/computers10120162","type":"journal-article","created":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T22:50:45Z","timestamp":1638226245000},"page":"162","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["IoT Security Mechanisms in the Example of BLE"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4952-4043","authenticated-orcid":false,"given":"Evgeny","family":"Kalinin","sequence":"first","affiliation":[{"name":"Faculty of Security, Tomsk State University of Control Systems and Radioelectronics, 634000 Tomsk, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6111-455X","authenticated-orcid":false,"given":"Danila","family":"Belyakov","sequence":"additional","affiliation":[{"name":"Faculty of Security, Tomsk State University of Control Systems and Radioelectronics, 634000 Tomsk, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0875-3301","authenticated-orcid":false,"given":"Dmitry","family":"Bragin","sequence":"additional","affiliation":[{"name":"Faculty of Security, Tomsk State University of Control Systems and Radioelectronics, 634000 Tomsk, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3222-9956","authenticated-orcid":false,"given":"Anton","family":"Konev","sequence":"additional","affiliation":[{"name":"Faculty of Security, Tomsk State University of Control Systems and Radioelectronics, 634000 Tomsk, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cardullo, P., and Roio, D. (2020). Mesh Networks, Wiley Online Library.","DOI":"10.31219\/osf.io\/tepgc"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Cilfone, A., Davoli, L., Belli, L., and Ferrari, G. (2019). Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies. Future Internet, 11.","DOI":"10.3390\/fi11040099"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zanaj, E., Caso, G., De Nardis, L., Mohammadpour, A., Alay, O., and Di Benedetto, M.G. (2021). Energy Efficiency in Short and Wide-Area IoT Technologies\u2014A Survey. Technologies, 9.","DOI":"10.3390\/technologies9010022"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Basu, S., Baert, M., and Hoebeke, J. (2021). QoS Enabled Heterogeneous BLE Mesh Networks. J. Sens. Actuator Netw., 10.","DOI":"10.3390\/jsan10020024"},{"key":"ref_5","unstructured":"Lin, Y.W., and Lin, C.Y. (2021, June 28). Beyond Beacons\u2014An Interactive Positioning and Tracking System Solely Based on BLE Mesh Network. Available online: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-65521-5_30."},{"key":"ref_6","unstructured":"Dhandapani, K., Harshavardhan, A., Kumar, V., Sunitha, D., and Korra, S. (2021). BLE in IoT: Improved link stability and energy conservation using fuzzy approach for smart homes automation. Mater. Today Proc., in press."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Darroudi, S.M., Caldera-S\u00e0nchez, R., and Gomez, C. (2019). Bluetooth Mesh Energy Consumption: A Model. Sensors, 19.","DOI":"10.3390\/s19051238"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"012004","DOI":"10.1088\/1757-899X\/1032\/1\/012004","article-title":"Deployment of mesh network in an indoor scenario for application in IoT communications","volume":"1032","author":"Angelov","year":"2021","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_9","unstructured":"SIG, B. (2021, July 01). Core Specification 5.3. Available online: https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification\/."},{"key":"ref_10","unstructured":"SIG, B. (2021, July 01). Mesh Profile 1.0.1. Available online: https:\/\/www.bluetooth.com\/specifications\/specs\/mesh-profile-1-0-1\/."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sen, J. (2013). Security and Privacy Issues in Wireless Mesh Networks: A Survey, Springer.","DOI":"10.1007\/978-3-642-36169-2_7"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ghori, M., Wan, T.C., Anbar, M., Sodhy, G., and Rizwan, A. (2019, January 15\u201317). Review on security in bluetooth low energy mesh network in correlation with wireless mesh network security. Proceedings of the 2019 IEEE Student Conference on Research and Development (SCOReD), Bandar Seri Iskandar, Malaysia.","DOI":"10.1109\/SCORED.2019.8896310"},{"key":"ref_13","unstructured":"To\u00e7illa, A. (2021, June 28). Overview of Security in Wireless Mesh Networks (WMNs). Available online: https:\/\/www.researchgate.net\/publication\/341043358_Overview_of_Security_in_Wireless_Mesh_Networks_WMNs."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Sevier, S., and Tekeoglu, A. (2019, January 22\u201325). Analyzing the Security of Bluetooth Low Energy. Proceedings of the 2019 International Conference on Electronics, Information, and Communication (ICEIC), Auckland, New Zealand.","DOI":"10.23919\/ELINFOCOM.2019.8706457"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Gupta, D.S., Wani, A., Kumar, S., Srivastava, A., and Sharma, D. (2019). Wireless Mesh Network Security, Architecture, and Protocols, IGI Global.","DOI":"10.4018\/978-1-7998-0373-7.ch001"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Adomnicai, A., Fournier, J., and Masson, L. (June, January 30). Hardware Security Threats Against Bluetooth Mesh Networks. Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China.","DOI":"10.1109\/CNS.2018.8433184"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11276-020-02498-7","article-title":"Providing interoperability in Bluetooth mesh with an improved provisioning protocol","volume":"27","author":"Hortelano","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ghori, M., Wan, T.C., and Sodhy, G. (2020). Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols. Sensors, 20.","DOI":"10.3390\/s20123590"},{"key":"ref_19","unstructured":"SIG, B. (2021, July 01). Mesh Model 1.0.1. Available online: https:\/\/www.bluetooth.com\/specifications\/specs\/mesh-model-1-0-1\/."},{"key":"ref_20","unstructured":"Suthar, F.A., Patel, R.K., and Prajapati, J.B. (2021, July 01). Overview of Wireless Mesh Network\u2019s in Bluetooth Mesh. Available online: https:\/\/ssrn.com\/abstract=3817363."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Baert, M., Rossey, J., Shahid, A., and Hoebeke, J. (2018). The Bluetooth Mesh Standard: An Overview and Experimental Evaluation. Sensors, 18.","DOI":"10.3390\/s18082409"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"072004","DOI":"10.1088\/1757-899X\/322\/7\/072004","article-title":"Smart-Home Architecture Based on Bluetooth mesh Technology","volume":"322","author":"Wan","year":"2018","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"97946","DOI":"10.1109\/ACCESS.2020.2993819","article-title":"An Energy Balanced Flooding Algorithm for a BLE Mesh Network","volume":"8","author":"Brandao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Darroudi, S.M., and Gomez, C. (2017). Bluetooth Low Energy Mesh Networks: A Survey. Sensors, 17.","DOI":"10.3390\/s17071467"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sirur, S., Juturu, P., Gupta, H.P., Serikar, P.R., Reddy, Y.K., Barak, S., and Kim, B. (2015, January 1\u20134). A mesh network for mobile devices using Bluetooth low energy. Proceedings of the 2015 IEEE SENSORS, Busan, Korea.","DOI":"10.1109\/ICSENS.2015.7370451"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Murillo, Y., Reynders, B., Chiumento, A., Malik, S., Crombez, P., and Pollin, S. (2017, January 8\u201313). Bluetooth now or low energy: Should BLE mesh become a flooding or onnection oriented network?. Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada.","DOI":"10.1109\/PIMRC.2017.8292705"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Weng, J., Dey, R., and Fu, X. (2021, June 28). Bluetooth Low Energy (BLE) Security and Privacy. Available online: http:\/\/www.cs.ucf.edu\/~rajib\/BLE-Encyclopedia2019.pdf.","DOI":"10.1007\/978-3-319-32903-1_298-1"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/MCOM.001.1900523","article-title":"Bluetooth Low Energy Mesh Networks: A Standards Perspective","volume":"58","author":"Darroudi","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"53784","DOI":"10.1109\/ACCESS.2020.2980795","article-title":"Bluetooth Mesh Analysis, Issues and Challenges","volume":"8","author":"Valdovinos","year":"2020","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/smartcities2010001","article-title":"Proposal and Application of Bluetooth Mesh Profile for Smart Cities\u2019 Services","volume":"2","author":"Veiga","year":"2018","journal-title":"Smart Cities"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Padgette, J., Bahr, J., Batra, M., Holtmann, M., Smithbey, R., Chen, L., and Scarfone, K. (2017). NIST Special Publication 800-121 Revision 2, Guide to Bluetooth Security, Technical Report.","DOI":"10.6028\/NIST.SP.800-121r2"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_33","unstructured":"Ren, K. (2021, July 01). Provisioning a Bluetooth Mesh Network Part 2. Available online: https:\/\/www.bluetooth.com\/blog\/provisioning-a-bluetooth-mesh-network-part-2\/."},{"key":"ref_34","unstructured":"(2021, July 01). Nordic. nRF52840 DK. Available online: https:\/\/www.nordicsemi.com\/Products\/Development-hardware\/nRF52840-DK."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2019.1800122","article-title":"A Multiprotocol Low-Cost Automated Testbed for BLE Mesh","volume":"57","author":"Murillo","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_36","unstructured":"PlutoSDR (2021, July 01). ADALM-PLUTO Overview. Available online: https:\/\/plutosdr.org\/adalm-pluto-overview\/."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"233","DOI":"10.22214\/ijraset.2020.30844","article-title":"Wireless Sensor Network Jammer Attack: A Detailed Review","volume":"8","author":"Dhivyasri","year":"2020","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Di Marco, P., Park, P., Pratesi, M., and Santucci, F. (2020). A Bluetooth-Based Architecture for Contact Tracing in Healthcare Facilities. J. Sens. Actuator Networks, 10.","DOI":"10.3390\/jsan10010002"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/12\/162\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:37:12Z","timestamp":1760168232000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/12\/162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":38,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["computers10120162"],"URL":"https:\/\/doi.org\/10.3390\/computers10120162","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2021,11,29]]}}}