{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:27:34Z","timestamp":1772645254653,"version":"3.50.1"},"reference-count":118,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T00:00:00Z","timestamp":1593043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks.<\/jats:p>","DOI":"10.3390\/s20123590","type":"journal-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T10:36:54Z","timestamp":1593081414000},"page":"3590","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2247-5723","authenticated-orcid":false,"given":"Muhammad Rizwan","family":"Ghori","sequence":"first","affiliation":[{"name":"School of Computer Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3094-8228","authenticated-orcid":false,"given":"Tat-Chee","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Computer Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia"},{"name":"National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang 11800, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2955-6462","authenticated-orcid":false,"given":"Gian Chand","family":"Sodhy","sequence":"additional","affiliation":[{"name":"School of Computer Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2020,6,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-981-15-2693-0_18","article-title":"Bluetooth Low Energy 5 Mesh Based Hospital Communication Network (B5MBHCN)","volume":"Volume 1132","author":"Ghori","year":"2020","journal-title":"Advances in Cyber Security"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Darroudi, S.M., and Gomez, C. (2017). Bluetooth Low Energy Mesh Networks: A Survey. Sensors, 17.","DOI":"10.3390\/s17071467"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gohel, S. (2018, January 28\u201329). Bluetooth Attendance System with Android Application for ERP. Proceedings of the International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, India.","DOI":"10.1109\/GUCON.2018.8674898"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Sthapit, P., Gang, H., and Pyun, J. (2018, January 24\u201326). Bluetooth Based Indoor Positioning Using Machine Learning Algorithms. Proceedings of the IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Jeju, Korea.","DOI":"10.1109\/ICCE-ASIA.2018.8552138"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Yumantoro, G., Kristalina, P., and Sudarsono, A. (2018, January 29\u201330). Performance Evaluation of Indoor Characteristic based on Bluetooth Low Energy Communication System through Statistical Approach. Proceedings of the International Electronics Symposium on Engineering Technology and Applications (IES-ETA), Bali, Indonesia.","DOI":"10.1109\/ELECSYM.2018.8615484"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Handojo, A., Lim, R., Octavia, T., and Anggita, K. (2018, January 12\u201314). Museum Interactive Information Broadcasting Using Indoor Positioning System and Bluetooth Low Energy: A Pilot Project on Trowulan Museum Indonesia. Proceedings of the 3rd Technology Innovation Management and Engineering Science International Conference (TIMES-iCON), Bangkok, Thailand.","DOI":"10.1109\/TIMES-iCON.2018.8621815"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sunardy, A., and Surantha, N. (2018, January 22\u201326). Performance Evaluation of Indoor Positioning Algorithm using Bluetooth Low Energy. Proceedings of the International Conference on Information Technology Systems and Innovation (ICITSI), Bandung, Indonesia.","DOI":"10.1109\/ICITSI.2018.8695934"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mohsin, N., Payandeh, S., Ho, D., and Gelinas, J.P. (2018, January 18\u201321). Bluetooth Low Energy Based Activity Tracking of Patient. Proceedings of the 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Singapore.","DOI":"10.1109\/ICARCV.2018.8581102"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Giovanelli, D., Farella, E., Fontanelli, D., and Macii, D. (2018, January 24\u201327). Bluetooth-Based Indoor Positioning Through ToF and RSSI Data Fusion. Proceedings of the International Conference on Indoor Positioning and Indoor Navigation (IPIN), Nantes, France.","DOI":"10.1109\/IPIN.2018.8533853"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"9587","DOI":"10.1109\/ACCESS.2017.2707556","article-title":"Topology Configuration and Multihop Routing Protocol for Bluetooth Low Energy Networks","volume":"5","author":"Jung","year":"2017","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"26505","DOI":"10.1109\/ACCESS.2018.2834479","article-title":"Multi-Hop Real-Time Communications Over Bluetooth Low Energy Industrial Wireless Mesh Networks","volume":"6","author":"Leonardi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_12","unstructured":"(2020, February 20). Bluetooth Vulnerabilities. Available online: https:\/\/thehackernews.com\/2020\/02\/hacking-bluetooth-vulnerabilities.html."},{"key":"ref_13","unstructured":"(2020, February 19). Zephyr Projects. Available online: https:\/\/docs.zephyrproject.org."},{"key":"ref_14","unstructured":"Townsend, K., Cufi, C., and Davidson, R. (2014). Protocol Basics in Getting Started with Bluetooth Low Energy, O\u2019Reilly Media. Available online: https:\/\/www.oreilly.com\/library\/view\/getting-started-with\/9781491900550\/."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3343855","article-title":"A Survey on Bluetooth 5.0 and Mesh: New Milestones of IoT","volume":"15","author":"Yin","year":"2019","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Tosi, J., Taffoni, F., Santacatterina, M., Sannino, R., and Formica, D. (2017). Performance Evaluation of Bluetooth Low Energy: A Systematic Review. Sensors, 17.","DOI":"10.3390\/s17122898"},{"key":"ref_17","unstructured":"(2020, February 19). Bluetooth. Available online: https:\/\/www.bluetooth.com."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"11734","DOI":"10.3390\/s120911734","article-title":"Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology","volume":"12","author":"Gomez","year":"2012","journal-title":"Sensors"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhang, J., and Sun, Z. (2016, January 4\u20136). Assessing multi-hop performance of reactive routing protocols in wireless sensor networks. Proceedings of the 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China.","DOI":"10.1109\/ICCSN.2016.7587198"},{"key":"ref_20","first-page":"61","article-title":"Comparison of on Demand Routing Protocols","volume":"5","author":"Bhushan","year":"2013","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"103","DOI":"10.47893\/UARJ.2012.1023","article-title":"A Novel Review on Routing Protocols in MANETs","volume":"1","author":"Kaur","year":"2012","journal-title":"Undergrad. Acad. Res. J. (UARJ)"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Perkins, C., and Das, S. (2003). Ad hoc On-Demand Distance Vector (AODV) Routing, University of Cincinnati. Available online: https:\/\/tools.ietf.org\/html\/rfc3561.","DOI":"10.17487\/rfc3561"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Johnson, D., and Hu, Y. (2007). The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4, Rice University. Available online: https:\/\/tools.ietf.org\/html\/rfc4728.","DOI":"10.17487\/rfc4728"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Chroboczek, J. (2011). The Babel Routing Protocol, University of Paris. Available online: https:\/\/tools.ietf.org\/html\/rfc6126.","DOI":"10.17487\/rfc6126"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Clausen, T., and Jacquet, P. (2003). Optimized Link State Routing Protocol (OLSR), INRIA. Available online: https:\/\/tools.ietf.org\/html\/rfc3626.","DOI":"10.17487\/rfc3626"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/190809.190336","article-title":"Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers","volume":"24","author":"Perkins","year":"1999","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_27","unstructured":"Basagni, S. (, January October). A distance routing effect algorithm for mobility (DREAM). Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, USA. Available online: https:\/\/ece.northeastern.edu\/fac-ece\/basagni\/papers\/BasagniCSW98.pdf."},{"key":"ref_28","unstructured":"Neumann, A., Aichele, C., Lindner, M., and Wunderlich, S. (2008). Better Approach To Mobile Ad-hoc Networking, Technische Universit\u00e4t Dresden."},{"key":"ref_29","unstructured":"Jiang, M., Li, J., and Hu, Y. (1999). Cluster Based Routing Protocol (CBRP) Functional Specification, National University of Singapore (NUS)."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-004-4753-x","article-title":"TTDD: Two-Tier Data Dissemination in Large-Scale Wireless Sensor Networks","volume":"11","author":"Luo","year":"2005","journal-title":"Wirel. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1109\/TMC.2014.2366776","article-title":"Ring Routing: An Energy-Efficient Routing Protocol for Wireless Sensor Networks with a Mobile Sink","volume":"14","author":"Tunca","year":"2015","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2697","DOI":"10.1007\/s11276-019-01988-7","article-title":"E2SR2: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks","volume":"25","author":"Bhushan","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1007\/s11277-019-06948-0","article-title":"ISFC-BLS (Intelligent and Secured Fuzzy Clustering Algorithm Using Balanced Load Sub-Cluster Formation) in WSN Environment","volume":"111","author":"Bhushan","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3944","DOI":"10.1109\/JSEN.2014.2358567","article-title":"SEECH: Scalable Energy Efficient Clustering Hierarchy Protocol in Wireless Sensor Networks","volume":"14","author":"Tarhani","year":"2014","journal-title":"IEEE Sens. J."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.asoc.2014.11.063","article-title":"MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks","volume":"30","author":"Sert","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Leon, J., Duenas, A., Lano, Y., Makluf, C.A., and Kemper, G. (2017, January 8\u201310). A Bluetooth Low Energy mesh network auto-configuring Proactive Source Routing protocol. Proceedings of the IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2017.7889350"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Sikora, A., Krzyszton, M., and Marks, M. (2018, January 22\u201323). Application of Bluetooth low energy protocol for communication in mobile networks. Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Warsaw, Poland.","DOI":"10.1109\/ICMCIS.2018.8398689"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Garcete, D.A., Vazquez, L., and Villalba, C. (2018, January 1\u20135). Centralized indoor positioning system using bluetooth low energy. Proceedings of the XLIV Latin American Computer Conference (CLEI), Sao Paulo, Brazil.","DOI":"10.1109\/CLEI.2018.00109"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Balogh, A., Imre, S., Lendvai, K., and Szabo, S. (2015, January 16\u201318). Service Mediation in multihop Bluetooth Low Energy networks based on NDN approach. Proceedings of the 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia.","DOI":"10.1109\/SOFTCOM.2015.7314123"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Mikhaylov, K., and Tervonen, J. (2013, January 5\u20137). Multihop data transfer service for Bluetooth Low Energy. Proceedings of the 13th international Conference on ITS Telecommunications (ITST), Tampere, Finland.","DOI":"10.1109\/ITST.2013.6685566"},{"key":"ref_41","unstructured":"Wang, S., and Chiang, K. (2017, January 6\u201310). BLE Tree Networks for Sensor Devices in Internet of Thing. Proceedings of the DASC, PiCom, DataCom, CyberSciTech, Orlando, FL, USA."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Martinez, C., Eras, L., and Dominguez, F. (2018, January 15\u201319). The Smart Doorbell: A proof-of-concept Implementation of a Bluetooth Mesh Network. Proceedings of the IEEE Third Ecuador Technical Chapters Meeting (ETCM), Cuenca, Ecuador.","DOI":"10.1109\/ETCM.2018.8580325"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Sirur, S., Juturu, P., Gupta, H.P., Serikar, P.R., Reddy, Y.K., Barak, S., and Kim, B. (2015, January 1\u20134). A mesh network for mobile devices using Bluetooth low energy. Proceedings of the IEEE Sensors, Busan, Korea.","DOI":"10.1109\/ICSENS.2015.7370451"},{"key":"ref_44","unstructured":"Guo, Z., Harris, I.G., Tsaur, L., and Chen, X. (2015, January 9\u201312). An on-demand scatternet formation and multi-hop routing protocol for BLE-based wireless sensor networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bardoutsos, A., Filios, G., Katsidimas, I., and Nikoletseas, S. (2019, January 29\u201331). Energy Efficient Algorithm for Multihop BLE Networks on Resource-Constrained Devices. Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece.","DOI":"10.1109\/DCOSS.2019.00083"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Dvinge, R.T.E., Stalmach, A., and Nalpantidis, L. (2019, January 13\u201315). Connection-Based Bluetooth Mesh Network as a Low Energy Solution for Off-Grid Data Networks. Proceedings of the 8th International Conference on Modern Circuits and Systems Technologies (MOCAST), Thessaloniki, Greece.","DOI":"10.1109\/MOCAST.2019.8741589"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Murillo, Y., Chiumento, A., Reynders, B., and Pollin, S. (2019, January 20\u201324). SDN on BLE: Controlling Resource Constrained Mesh Networks. Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761066"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Ng, P.C., and She, J. (2019, January 15\u201318). A Novel Overlay Mesh with Bluetooth Low Energy Network. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco.","DOI":"10.1109\/WCNC.2019.8886069"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"2124","DOI":"10.1109\/LCOMM.2018.2864994","article-title":"Modeling the Connectivity of Data-Channel-Based Bluetooth Low Energy Mesh Networks","volume":"22","author":"Darroudi","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Murillo, Y., Reynders, B., Chiumento, A., Malik, S., Crombez, P., and Pollin, S. (2017, January 8\u201313). Bluetooth now or low energy: Should BLE mesh become a flooding or connection oriented network. Proceedings of the IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada.","DOI":"10.1109\/PIMRC.2017.8292705"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2019.1800122","article-title":"A Multiprotocol Low-Cost Automated Testbed for BLE Mesh","volume":"57","author":"Murillo","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Chiumento, A., Reynders, B., Murillo, Y., and Pollin, S. (2018, January 15\u201318). Building a connected BLE mesh: A network inference study. Proceedings of the IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain.","DOI":"10.1109\/WCNCW.2018.8369004"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Hansen, E.A., Nielsen, M.H., Serup, D.E., Williams, R.J., Madsen, T.K., and Abildgren, R. (2018, January 5\u20139). On Relay Selection Approaches in Bluetooth Mesh Networks. Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Moscow, Russia.","DOI":"10.1109\/ICUMT.2018.8631214"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Li, R., and Li, X. (2019, January 18\u201321). Directional Multi-path Routing Algorithm Based on BLE Mesh. Proceedings of the Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), Taiyuan, China.","DOI":"10.1109\/CSQRWC.2019.8799249"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Patti, G., Leonardi, L., and Lo Bello, L. (2016, January 23\u201326). A Bluetooth Low Energy real-time protocol for Industrial Wireless mesh Networks. Proceedings of the IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society, Florence, Italy.","DOI":"10.1109\/IECON.2016.7793093"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Luo, B., Sun, Z., Pang, Y., Ahmad, A., Lin, J., Wu, J., and Zhang, H. (2020). Neighbor Discovery for IPv6 over BLEMesh Networks. Appl. Sci., 10.","DOI":"10.3390\/app10051844"},{"key":"ref_57","first-page":"1","article-title":"Bluetooth Low Energy Mesh Networks: A Standards Perspective","volume":"30","author":"Darroudi","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Ferranti, L., D\u2019Oro, S., Bonati, L., Demirors, E., Cuomo, F., and Melodia, T. (2019, January 10\u201312). HIRO-NET: Self-Organized Robotic Mesh Networking for Internet Sharing in Disaster Scenarios. Proceedings of the 20th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Washington, DC, USA.","DOI":"10.1109\/WoWMoM.2019.8793029"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Vijay, R., Prabhakar, T.V., Hegde, V., Rao, V.S., and Prasad, R.V. (2019, January 3\u20135). A Heterogeneous PLC with BLE Mesh network for Reliable and Real-time Smart Cargo Monitoring. Proceedings of the IEEE International Symposium on Power Line Communications and its Applications (ISPLC), Praha, Czech Republic.","DOI":"10.1109\/ISPLC.2019.8693413"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Vijay, R., Singh, H., Prabhakar, T.V., Hegde, V., and Shigehalli, P. (2018, January 6\u20138). Air cargo monitoring: A robust tamper detection and reliable communication system. Proceedings of the SIES, Graz, Austria.","DOI":"10.1109\/SIES.2018.8442087"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"28417","DOI":"10.1109\/ACCESS.2018.2836677","article-title":"IoT Heterogeneous Mesh Network Deployment for Human-in-the-Loop Challenges towards a Social and Sustainable Industry 4.0","volume":"6","author":"Hortelano","year":"2018","journal-title":"IEEE Access"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.1002\/sec.846","article-title":"A survey on security and privacy issues in Wireless Mesh Networks","volume":"9","author":"Sgora","year":"2013","journal-title":"Secur. Commun. Netw."},{"key":"ref_63","unstructured":"Pammi, A.A. (2017). Threats, Countermeasures, and Research Trends for BLE-Based IoT Devices. [Master\u2019s Thesis, Arizona State University]."},{"key":"ref_64","unstructured":"(2020, February 20). CIA, Available online: https:\/\/devqa.io."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Mishra, R., Singh, A., and Kumar, R. (2016, January 3\u20135). VANET Security: Issues, Challenges and Solutions. Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India.","DOI":"10.1109\/ICEEOT.2016.7754846"},{"key":"ref_66","unstructured":"Adomnicai, A., Fournier, J.A.A., and Masson, A. (June, January 30). Hardware Security Threats Against Bluetooth Mesh Networks. Proceedings of the IEEE Conference on Communications and Network Security (CNS), Beijing, China."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Lonzetta, A.M., Cope, P., Campbell, J., and Mohd, B.J. (2018). Security Vulnerabilities in Bluetooth Technology as Used in IoT. J. Sens. Actuator Netw., 7.","DOI":"10.3390\/jsan7030028"},{"key":"ref_68","unstructured":"(2020, February 20). Types of Network Attacks. Available online: https:\/\/www.omnisecu.com."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Ghori, M.R., Wan, T.C., Anbar, M., Sodhy, G.C., and Rizwan, A. (2019, January 15\u201317). Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security. Proceedings of the IEEE Student Conference on Research and Development (SCOReD), Bandar Seri Iskandar, Malaysia.","DOI":"10.1109\/SCORED.2019.8896310"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Karimireddy, T., and Bakshi, A. (2016, January 23\u201325). A Hybrid Security Framework for the Vehicular Communications in VANET. Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2016.7566479"},{"key":"ref_71","first-page":"46","article-title":"CPAL: A Conditional Privacy-Preserving Authentication with Access Linkability for Roaming Service","volume":"1","author":"Lai","year":"2014","journal-title":"IEEE IoT J."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.comnet.2016.02.007","article-title":"GLARM: Group-Based Lightweight Authentication Scheme for Resource Constrained Machine to Machine Communications","volume":"9","author":"Lai","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_73","first-page":"88","article-title":"S2M: A Lightweight Acoustic Fingerprints Based Wireless Device Authentication Protocol","volume":"4","author":"Chen","year":"2017","journal-title":"IEEE IoT J."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Chuang, Y.H., Lo, N.W., Yang, C.Y., and Tang, S.W. (2018). A Lightweight Continuous Authentication Protocol for the Internet of Things. Sensors, 18.","DOI":"10.3390\/s18041104"},{"key":"ref_75","first-page":"1","article-title":"BLE injection-free attack: A novel attack on bluetooth low energy devices","volume":"20","author":"Santos","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_76","unstructured":"(2020, April 15). KNOB Attack. Available online: https:\/\/knobattack.com\/."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Yu, X., and Wang, Y. (2009, January 18\u201320). Secure Constructing Bluetooth Scatter net Based on BTCP. Proceedings of the Fifth International Conference on Information Assurance and Security (IAS), Xi\u2019an, China.","DOI":"10.1109\/IAS.2009.174"},{"key":"ref_78","unstructured":"Sadghzadh, S.H., Shirazani, S.J.R., and Mosleh, M. (2010, January 7\u201310). A new secure scheme purposed for recognition and authentication protocol in Bluetooth environment. Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT), Phoenix Park, Korea."},{"key":"ref_79","unstructured":"Xu, G., and Yu, B. (2011, January 24\u201326). Security Enhanced Design of the Bluetooth Simple Pairing Protocol. Proceedings of the International Conference on Computer Science and Network Technology (ICCSNT), Harbin, China."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Diallo, A.S., and Wajdi, A. (2014, January 23\u201325). A Secure Authentication Scheme for Bluetooth Connection. Proceedings of the IEEE International Conference on Computer and Communication Engineering (CCET), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCCE.2014.29"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Fan, C., Shieh, S., and Li, B. (2011, January 21\u201323). On the security of password-based pairing protocol in Bluetooth. Proceedings of the Asia-Pacific Bluetooth Operations and Management Symposium, Taipei, Taiwan.","DOI":"10.1109\/APNOMS.2011.6076998"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Priyanka, S.S., and Nagajayanthi, B. (2014, January 27\u201329). Enhancing Security in Bluetooth Networks. Proceedings of the ICSEMR, Chennai, India.","DOI":"10.1109\/ICSEMR.2014.7043560"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"2351","DOI":"10.1007\/s11277-020-07153-0","article-title":"BLE-Based Authentication Protocol for Micropayment Using Wearable Device","volume":"112","author":"Nai","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"24639","DOI":"10.1109\/ACCESS.2018.2799942","article-title":"A Blockchain Connected Gateway for BLE-based Devices in the Internet of Things","volume":"6","author":"Cha","year":"2018","journal-title":"IEEE Access"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/JCN.2018.000041","article-title":"Design of cognitive fog computing for intrusion detection in Internet of Things","volume":"20","author":"Prabavathy","year":"2018","journal-title":"J. Commun. Netw."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Choudhary, S., and Kesswani, N. (2018, January 1\u20133). Detection and Prevention of Routing Attacks in Internet of Things. Proceedings of the TrustCom\/BigDataSE, Newyork, NY, USA.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00219"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"38688","DOI":"10.1109\/ACCESS.2019.2905754","article-title":"A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning","volume":"7","author":"Tian","year":"2019","journal-title":"IEEE Access"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","article-title":"Toward a Lightweight Intrusion Detection System for the Internet of Things","volume":"7","author":"Jan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","article-title":"A Supervised Intrusion Detection System for Smart Home IoT Devices","volume":"6","author":"Anthi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","article-title":"Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things","volume":"6","author":"Zolanvari","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"158126","DOI":"10.1109\/ACCESS.2019.2948912","article-title":"Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly","volume":"7","author":"Liang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K., Sharma, V., Choudhary, G., Chen, I., and Cho, J. (2018, January 4\u20137). On IoT Misbehavior Detection in Cyber Physical Systems. Proceedings of the PRDC, Taipei, Taiwan.","DOI":"10.1109\/PRDC.2018.00033"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"118556","DOI":"10.1109\/ACCESS.2019.2917135","article-title":"BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems","volume":"7","author":"Sharma","year":"2019","journal-title":"IEEE Access"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"52181","DOI":"10.1109\/ACCESS.2019.2912115","article-title":"Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection","volume":"7","author":"Alhakami","year":"2019","journal-title":"IEEE Access"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1049\/iet-net.2018.5036","article-title":"COLIDE: A Collaborative Intrusion Detection Framework for Internet of Things","volume":"8","author":"Arshad","year":"2019","journal-title":"IET Netw."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1109\/TIFS.2019.2922262","article-title":"A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks","volume":"15","author":"Abhishek","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"110510","DOI":"10.1109\/ACCESS.2019.2933859","article-title":"Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service","volume":"7","author":"Choi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","article-title":"SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks","volume":"7","author":"Nguyen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Jokar, P., Nicanfar, H., and Leung, V.C.M. (2011, January 17\u201320). Specification-based Intrusion Detection for home area networks in smart grids. Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, Belgium.","DOI":"10.1109\/SmartGridComm.2011.6102320"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Stelte, B., and Rodosek, G.D. (2013, January 14\u201318). Thwarting attacks on ZigBee-Removal of the KillerBee stinger. Proceedings of the CNSM, Zurich, Switzerland.","DOI":"10.1109\/CNSM.2013.6727840"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Al Baalbaki, B., Pacheco, J., Tunc, C., Hariri, S., and Al-Nashif, Y. (2015, January 17\u201320). Anomaly Behavior Analysis System for ZigBee in smart buildings. Proceedings of the AICCSA, Marrakech, Morocco.","DOI":"10.1109\/AICCSA.2015.7507187"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Maphatsoe, T., and Masinde, M. (2018, January 6\u20137). Asymptotic Analysis of A Fuzzy Based Intrusion Detection System For Zigbee. Proceedings of the ICONIC, Paline Magnien, Mauritius.","DOI":"10.1109\/ICONIC.2018.8601277"},{"key":"ref_103","first-page":"1800","article-title":"Intrusion Detection and Prevention for ZigBee-Based Home Area Networks in Smart Grids","volume":"9","author":"Jokar","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i45\/102866","article-title":"Wormhole Attack Detection in Zigbee Wireless Sensor Networks using Intrusion Detection System","volume":"9","author":"Jegan","year":"2016","journal-title":"Indian J. Sci. Technol."},{"key":"ref_105","first-page":"155","article-title":"Energy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks","volume":"10","author":"Govindasamy","year":"2017","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"32853","DOI":"10.1109\/ACCESS.2019.2903816","article-title":"A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M.A., and Vinkovits, M. (2013, January 7\u20139). Denial-of-Service detection in 6LoWPAN based Internet of Things. Proceedings of the WiMob, Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Cervantes, C., Poplade, D., Nogueira, M., and Santos, A. (2015, January 11\u201315). Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. Proceedings of the IFIP\/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada.","DOI":"10.1109\/INM.2015.7140344"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Surendar, M., and Umamakeswari, A. (2016, January 23\u201325). InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN. Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2016.7566473"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"16623","DOI":"10.1109\/ACCESS.2018.2798626","article-title":"Compression Header Analyzer Intrusion Detection System (CHA-IDS) for 6LoWPAN Communication Protocol","volume":"6","author":"Napiah","year":"2018","journal-title":"IEEE Access"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Althubaity, A., Ji, H., Gong, T., Nixon, M., Ammar, R., and Han, S. (2017, January 12\u201315). ARM: A hybrid specification-based intrusion detection system for rank attacks in 6TiSCH networks. Proceedings of the 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus.","DOI":"10.1109\/ETFA.2017.8247593"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Farzaneh, B., Montazeri, M.A., and Jamali, S. (2019, January 24\u201325). An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things. Proceedings of the ICWR, Tehran, Iran.","DOI":"10.1109\/ICWR.2019.8765272"},{"key":"ref_113","first-page":"5631","article-title":"Enabling Online Quantitative Security Analysis in 6LoWPAN Networks","volume":"6","author":"Ramos","year":"2019","journal-title":"IEEE IoT J."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"OConnor, T., and Reeves, D. (2008, January 8\u201312). Bluetooth Network-Based Misuse Detection. Proceedings of the Annual Computer Security Applications, Anaheim, CA, USA.","DOI":"10.1109\/ACSAC.2008.39"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Guo, Z., Harris, I.G., Jiang, Y., and Tsaur, L. (2017, January 26\u201329). An efficient approach to prevent Battery Exhaustion Attack on BLE-based mesh networks. Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Santa Clara, CA, USA.","DOI":"10.1109\/ICCNC.2017.7876092"},{"key":"ref_116","first-page":"102041","article-title":"Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System","volume":"101","author":"Mateusz","year":"2019","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_117","unstructured":"(2020, April 16). Bluetooth Mesh Security Overview. Available online: https:\/\/www.bluetooth.com\/blog\/bluetooth-mesh-security-overview\/."},{"key":"ref_118","unstructured":"Padgetter, J., Scarfone, K., and Chen, l. (2020, February 20). Guide to Bluetooth Security, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-121r2.pdf."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/12\/3590\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:42:38Z","timestamp":1760175758000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/12\/3590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,25]]},"references-count":118,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["s20123590"],"URL":"https:\/\/doi.org\/10.3390\/s20123590","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,25]]}}}