IP, or UDP layers except for simple PINcode
pairing, but as shown in Table I, the possible security
features of these layers are enough to get a good level
of security on the complete system. Implementing security
mechanism is however outside of the scope of this paper.