1. Bluetooth Special Interest Group (SIG) (2017) https://www.bluetooth.org/en-us
2. Hager CT, Midkiff SF (2003) An analysis of Bluetooth security vulnerabilities. In: Proceedings of IEEE Wireless Communications and Networking Conference-WCNC 2003, New Orleans, LA, USA, Volume: 3, pp. 1825–1831. IEEE Communications Society
3. Wong FL, Stajano F, Clulow J (2007) Repairing the Bluetooth pairing protocol. In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Proceedings of the 13th International Security Protocols Workshop-Security Protocols 2005, Cambridge, UK, Lecture Notes in Computer Science, vol 4631. Springer, Berlin Heidelberg, pp 31–45
4. Xu JF, Zhang T, Lin D, Mao Y, Liu XN, Chen SW, Shao S, Tian B, Yi SW (2013) Pairing and authentication security technologies in low-power Bluetooth. In: Proceedings of IEEE International Conference on Green Computing and Communications-GreenCom, IEEE International Conference on Internet of Things-iThings, IEEE International Conference on Cyber, Physical and Social Computing-CPSCom, Beijing, China, pp. 1081–1085. IEEE Computer Society
5. Mandal BK, Bhattacharyya D, Kim TH (2014) An architecture design for wireless authentication security in Bluetooth network. Int J Secur Appl 8(3):1–8