You can manage bookmarks using lists, please log in to your user account for this.
Media type:
E-Article
Title:
IoT Security Mechanisms in the Example of BLE
Contributor:
Kalinin, Evgeny;
Belyakov, Danila;
Bragin, Dmitry;
Konev, Anton
Published:
MDPI AG, 2021
Published in:
Computers, 10 (2021) 12, Seite 162
Language:
English
DOI:
10.3390/computers10120162
ISSN:
2073-431X
Origination:
Footnote:
Description:
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency.