Extracting the Security Features Implemented in a Bluetooth LE Connection | IEEE Conference Publication | IEEE Xplore