Security Threats and Countermeasures in Bluetooth-Enabled Systems: Practical Experiments, Vulnerability Evaluation, and Solutions