Content deleted Content added
m Bot: Aligning section names with MOS:SECTIONS |
Citation bot (talk | contribs) Removed URL that duplicated identifier. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 301/1032 |
||
(4 intermediate revisions by 4 users not shown) | |||
Line 3:
| name = Bluetooth mesh networking
| image = Bluetooth logo (2016).svg
| standard =
| developer = [[Bluetooth Special Interest Group|Bluetooth SIG]]
| introdate = {{Start date|2017|07|13}}
| industry
| connector =
| hardware =
| range
}}
Line 15:
== Overview ==
Bluetooth Mesh is a [[mesh networking]] standard that operates on a [[Flooding (computer networking)|flood network]] principle. It's based on the nodes relaying the messages: every relay node that receives a network packet that
* authenticates against a known network key * is not in message cache * has a TTL ≥ 2 can be retransmitted with TTL = TTL Communication is carried in the messages that may be up to 384 bytes long, when using Segmentation and Reassembly (SAR) mechanism, but most of the messages fit in one segment, that is 11 bytes. Each message starts with an opcode, which may be a single byte (for special messages), 2 bytes (for standard messages), or 3 bytes (for vendor-specific messages).
Line 53 ⟶ 59:
|}
==
Nodes that support the various features can be formed into a particular mesh network topology.
{| class="wikitable"
Line 158 ⟶ 164:
A key unique to a device known as "Device Key" is derived from elliptic curve shared secret on provisioner and device during the provisioning process. This device key is used by the provisioner to encrypt messages for that specific device.
The security of the provisioning process has been analyzed in a paper presented during the [[IEEE Communications Society|IEEE CNS]] 2018 conference.<ref>{{Cite book|last1=Adomnicai|first1=A.|last2=Fournier|first2=J. J. A.|last3=Masson|first3=L.|title=2018 IEEE Conference on Communications and Network Security (CNS) |chapter=Hardware Security Threats Against Bluetooth Mesh Networks |date=2018-05-30|pages=1–9
The provisioning can be performed using a Bluetooth GATT connection or advertising using the specific bearer.<ref name=":0" />
Line 338 ⟶ 344:
|-
|Tonly SIG Mesh Stack<ref>{{Cite web|url=https://launchstudio.bluetooth.com/ListingDetails/RedirectFromQdid/130160|title=QD ID 130160 {{!}} Launch Studio - Listing Details|website=launchstudio.bluetooth.com|access-date=2019-05-06}}</ref>
|[[Tonli|Shenzhen Tonli Science and Technology Development Co., Ltd]]
|{{Dts|2019-05-05}}
|130160
|