Security Threats and Countermeasures in Bluetooth-Enabled Systems by Keijo Haataja