2021
DOI: 10.3390/computers10120162
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security Mechanisms in the Example of BLE

Abstract: In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Without authentication mechanisms, an intruder can capture a previously legitimate message transmitted from an IIoT device to another entity, then modify and replay the message to its final destination [128]. This kind of attack is possible when the authentication is applied in a certain IIoT environment.…”
Section: Replay Attacksmentioning
confidence: 99%
“…Without authentication mechanisms, an intruder can capture a previously legitimate message transmitted from an IIoT device to another entity, then modify and replay the message to its final destination [128]. This kind of attack is possible when the authentication is applied in a certain IIoT environment.…”
Section: Replay Attacksmentioning
confidence: 99%
“…Our approach is based on the widely-adopted Counter with Cipher Block Chaining-Message Authentication Code (CCM) mode [21], used in a number of protocols such as Bluetooth Mesh [10], ZigBee [11], and WiFi [8] (with minor variations for each). Its implementation allows both authenticity and confidentiality to be achieved with a single algorithm.…”
Section: Wireless Security For Sfmentioning
confidence: 99%
“…Security implementations can be found in other wireless protocols in the IoT literature. For example, Bluetooth Mesh [10] protects against trash-can attacks using multiple keys and a multi-layer security. Furthermore, the protocol's sequence numbers and an Initialisation Vector (IV) are utilised to protect against replay attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations