skip to main content
research-article

A Survey on Bluetooth 5.0 and Mesh: New Milestones of IoT

Published:30 May 2019Publication History
Skip Abstract Section

Abstract

Ubiquitous connectivity among objects is the future of the coming Internet of Things era. Technologies are competing fiercely to fulfill this goal, but none of them can fit into all application scenarios. However, efforts are still made to expand application ranges of certain technologies. Shortly after the adoption of its newest version, Bluetooth 5.0, the Bluetooth Special Interest Group released another new specification on network topology: Bluetooth Mesh. Combined together, those two bring Bluetooth to a brand new stage. However, current works related to it only focus on part of the new Bluetooth, and discussion over the entire one is lacking. Therefore, in this survey, we conduct an investigation toward the new Bluetooth from a comprehensive perspective. Through this, we show that the new Bluetooth not only consolidates its strengths in original application fields but also brings alterations and opportunities to new ones, making it a strong competitor in the future for providing complete solutions to meet the demands of seamless communications in the Internet of Things area.

References

  1. Mathias Baert, Jen Rossey, Adnan Shahid, and Jeroen Hoebeke. 2018. The Bluetooth mesh standard: An overview and experimental evaluation. Sensors (Basel, Switzerland) 18, 8 (July 2018), 2409.Google ScholarGoogle Scholar
  2. Nick Baker. 2005. ZigBee and Bluetooth strengths and weaknesses for industrial applications. Computing 8 Control Engineering Journal 16, 2 (2005), 20--25.Google ScholarGoogle Scholar
  3. M. Collotta, G. Pau, T. Talty, and O. K. Tonguz. 2018. Bluetooth 5: A concrete step forward toward the IoT. IEEE Communications Magazine 56, 7 (July 2018), 125--131.Google ScholarGoogle ScholarCross RefCross Ref
  4. Seyed Mahdi Darroudi and Carles Gomez. 2017. Bluetooth low energy mesh networks: A survey. Sensors 17, 7 (2017), 1467.Google ScholarGoogle ScholarCross RefCross Ref
  5. Piergiusepps Di Macro, Per Skillermark, Anna Larmo, and Pontus Arvidson. 2017. Bluetooth Mesh Networking. Retrieved July 22, 2017 from https://www.ericsson.com/en/publications/white-papers/bluetooth-mesh-networking.Google ScholarGoogle Scholar
  6. Joshua F. Ensworth and Matthew S. Reynolds. 2017. BLE-backscatter: Ultralow-power IoT nodes compatible with Bluetooth 4.0 low energy (BLE) smartphones and tablets. IEEE Transactions on Microwave Theory and Techniques 65, 9 (2017), 3360--3368.Google ScholarGoogle ScholarCross RefCross Ref
  7. Christian Gehrmann. 2002. Bluetooth Security White Paper. Bluetooth SIG Security Expert Group.Google ScholarGoogle Scholar
  8. Bluetooth Mesh Working Group. 2017. Mesh Profile v1.0. Retrieved April 12, 2019 from https://www.bluetooth.com/specifications/mesh-specifications.Google ScholarGoogle Scholar
  9. C. T. Hager and S. F. Midkiff. 2003. An analysis of Bluetooth security vulnerabilities. In Proceedings of the 2003 IEEE Wireless Communications and Networking Conference (WCNC’03). Vol. 3. 1825--1831.Google ScholarGoogle Scholar
  10. Richard W. Hamming. 1950. Error detecting and error correcting codes. Bell System Technical Journal 29, 2 (1950), 147--160.Google ScholarGoogle ScholarCross RefCross Ref
  11. A. K. M. M. Hossain and W. Soh. 2007. A comprehensive study of Bluetooth signal parameters for localization. In Proceedings of the 2007 IEEE 18th International Symposium on Personal, Indoor, and Mobile Radio Communications. 1--5.Google ScholarGoogle Scholar
  12. N. Hunke, Z. Yusef, M. Ruessmann, F. Schmieg, A. Bhatia, and N. Kalra. 2017. Winning in IoT: It’s all about the business processes. BCG Perspectives. Available at https://www.bcg.com.Google ScholarGoogle Scholar
  13. H. J. Pérez Iglesias, V. Barral, and C. J. Escudero. 2012. Indoor person localization system through RSSI Bluetooth fingerprinting. In Proceedings of the 2012 19th International Conference on Systems, Signals, and Image Processing (IWSSIP’12). 40--43.Google ScholarGoogle Scholar
  14. Markus Jakobsson and Susanne Wetzel. 2001. Security weaknesses in Bluetooth. In Topics in Cryptology—CT-RSA 2001, D. Naccache (Ed.). Springer, Berlin, Germany, 176--191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Aravind Kailas, Valentina Cecchi, and Arindam Mukherjee. 2012. A survey of communications and networking technologies for energy management in buildings and home automation. Journal of Computer Networks and Communications 2012 (2012), Article 932181, 12 pages.Google ScholarGoogle Scholar
  16. Heikki Karvonen, Konstantin Mikhaylov, Matti Hämäläinen, Jari Iinatti, and Carlos Pomalaza-Ráez. 2017. Experimental performance evaluation of BLE 4 vs BLE 5 in indoors and outdoors scenarios. In Advances in Body Area Networks. Springer, 235--251.Google ScholarGoogle Scholar
  17. H. Kim, J. Lee, and J. W. Jang. 2015. BLEmesh: A wireless mesh network protocol for Bluetooth low energy devices. In Proceedings of the 2015 3rd International Conference on Future Internet of Things and Cloud. 558--563. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Kouhne and J. Sieck. 2014. Location-based services with iBeacon technology. In Proceedings of the 2014 2nd International Conference on Artificial Intelligence, Modelling, and Simulation. 315--321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Silicon Labs. 2018. Benchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance. Retrieved January 15, 2019 from https://www.silabs.com/products/wireless/learning-center/mesh-performance.Google ScholarGoogle Scholar
  20. Qiang Ma, Shanfeng Zhang, Tong Zhu, Kebin Liu, Lan Zhang, Wenbo He, and Yunhao Liu. 2017. PLP: Protecting location privacy against correlation analyze attack in crowdsensing. IEEE Transactions on Mobile Computing 16, 9 (2017), 2588--2598.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. 2012. Internet of Things: Vision, applications and research challenges. Ad Hoc Networks 10, 7 (2012), 1497--1516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou. 2009. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials 11, 4 (2009), 42--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Thomas Muller. 1999. Bluetooth Security Architecture. White Paper Version 1.0.Google ScholarGoogle Scholar
  24. Yuri Murillo, Brecht Reynders, Alessandro Chiumento, Salman Malik, Pieter Crombez, and Sofie Pollin. 2017. Bluetooth now or low energy: Should BLE mesh become a flooding or connection oriented network? In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’17). IEEE, Los Alamitos, CA, 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. I. Oksar. 2014. A Bluetooth signal strength based indoor localization method. In Proceedings of the 21st International Conference on Systems, Signals, and Image Processing (IWSSIP’14). 251--254.Google ScholarGoogle Scholar
  26. Gaetano Patti, Luca Leonardi, and Lucia Lo Bello. 2016. A Bluetooth low energy real-time protocol for industrial wireless mesh networks. In Proceedings of the 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON’16). IEEE, Los Alamitos, CA, 4627--4632.Google ScholarGoogle ScholarCross RefCross Ref
  27. Zhongmin Pei, Zhidong Deng, Bo Yang, and Xiaoliang Cheng. 2008. Application-oriented wireless sensor network communication protocols and hardware platforms: A survey. In Proceedings of the 2008 IEEE International Conference on Industrial Technology (ICIT’08). IEEE, Los Alamitos, CA, 1--6.Google ScholarGoogle Scholar
  28. Qualcomm. 2017. CSRmesh Development Kit. Retrieved May 5, 2018 from https://www.qualcomm.com/products/csrmesh-development-kit.Google ScholarGoogle Scholar
  29. Yaswanth Kumar Reddy, Praneeth Juturu, Hari Prabhat Gupta, Pramod Reddy Serikar, Shruti Sirur, Sulekha Barak, and Bonggon Kim. 2015. A connection oriented mesh network for mobile devices using Bluetooth low energy. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, New York, NY, 453--454. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Kai Ren. 2017. Exploring Bluetooth 5—How Fast Can It Be? Retrieved February 20, 2017 from https://blog.bluetooth.com/exploring-bluetooth-5-how-fast-can-it-be.Google ScholarGoogle Scholar
  31. Janessa Rivera and Rob van der Meulen. 2013. Gartner says the Internet of Things installed base will grow to 26 billion units by 2020. Stamford, CT, December 12.Google ScholarGoogle Scholar
  32. F. Samie, L. Bauer, and J. Henkel. 2016. IoT technologies for embedded computing: A survey. In Proceedings of the 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS’16). 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Nordic Semiconductor. 2016. Nordic nRF52840. Retrieved April 12, 2019 from https://www.nordicsemi.com/eng/Products/nRF52840.Google ScholarGoogle Scholar
  34. Bluetooth SIG. 2016. Bluetooth 5.0 Core Specification. Retrieved April 12, 2019 from https://www.bluetooth.com/specifications/bluetooth-core-specification.Google ScholarGoogle Scholar
  35. Sheng Tan and Jie Yang. 2016. WiFinger: Leveraging commodity WiFi for fine-grained finger gesture recognition. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, New York, NY, 201--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Jiliang Wang, Zhichao Cao, Xufei Mao, Xiang-Yang Li, and Yunhao Liu. 2016. Towards energy efficient duty-cycled networks: Aanalysis, implications and improvement. IEEE Transactions on Computers 1 (2016), 1--1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wendy Warne. 2016. Bluetooth 5 Is Here. Retrieved December 14, 2016 from https://blog.bluetooth.com/bluetooth-5-is-here.Google ScholarGoogle Scholar
  38. Wendy Warne. 2017. Exploring Bluetooth 5—What’s New in Advertising? Retrieved February 27, 2017 from https://blog.bluetooth.com/exploring-bluetooth5-whats-new-in-advertising.Google ScholarGoogle Scholar
  39. Martin Woolley. 2017. Exploring Bluetooth 5—Going the Distance. Retrieved February 13, 2017 from https://blog.bluetooth.com/exploring-bluetooth-5-going-the-distance.Google ScholarGoogle Scholar
  40. C. Wu, Z. Yang, and Y. Liu. 2015. Smartphones based crowdsourcing for indoor localization. IEEE Transactions on Mobile Computing 14, 2 (Feb. 2015), 444--457.Google ScholarGoogle ScholarCross RefCross Ref
  41. C. Wu, Z. Yang, and C. Xiao. 2018. Automatic radio map adaptation for indoor localization using smartphones. IEEE Transactions on Mobile Computing 17, 3 (March 2018), 517--528.Google ScholarGoogle ScholarCross RefCross Ref
  42. Chenshu Wu, Zheng Yang, Zimu Zhou, Xuefeng Liu, Yunhao Liu, and Jiannong Cao. 2015. Non-invasive detection of moving and stationary human with wifi. IEEE Journal on Selected Areas in Communications 33, 11 (2015), 2329--2342.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Yaxiong Xie, Zhenjiang Li, and Mo Li. 2018. Precise power delay profiling with commodity Wi-Fi. IEEE Transactions on Mobile Computing (2018), 1--1.Google ScholarGoogle Scholar
  44. Zheng Yang, Chenshu Wu, and Yunhao Liu. 2012. Locating in fingerprint space: Wireless indoor localization with little human intervention. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom’12). ACM, New York, NY, 269--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Zheng Yang, Zimu Zhou, and Yunhao Liu. 2013. From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys 46, 2 (2013), 25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Thomas Zahn, Greg O’Shea, and Antony Rowstron. 2009. An empirical study of flooding in mesh networks. SIGMETRICS Performance Evaluation Review 37, 2 (Oct. 2009), 57--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, and Shiuhpyng Shieh. 2014. IoT security: Ongoing challenges and research opportunities. In Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA’14). IEEE, Los Alamitos, CA, 230--234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Y. Zhou, H. Wang, S. Zheng, and Z. Z. Lei. 2013. Advances in IEEE 802.11ah standardization for machine-type communications in sub-1GHz WLAN. In Proceedings of the 2013 IEEE International Conference on Communications Workshops (ICC’13). 1269--1273.Google ScholarGoogle Scholar

Index Terms

  1. A Survey on Bluetooth 5.0 and Mesh: New Milestones of IoT

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 15, Issue 3
        August 2019
        324 pages
        ISSN:1550-4859
        EISSN:1550-4867
        DOI:10.1145/3335317
        Issue’s Table of Contents

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 May 2019
        • Accepted: 1 February 2019
        • Revised: 1 January 2019
        • Received: 1 August 2018
        Published in tosn Volume 15, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format