for simple PINcode pairing, but as shown in Table I, the possible security features of these layers are enough to get a good level of security on the complete system. Implementing security mechanism is however outside of the scope of this paper
for simple PINcode pairing, but as shown in Table I, the possible security features of these layers are enough to get a good level of security on the complete system. Implementing security mechanism is however outside of the scope of this paper