R. Baldwin, Researcher finds huge security flaws in Bluetooth locks, 2016.

, Specification of the Bluetooth System, Covered Core Package Version 4.2, Master Table of Contents and Compliance, Bluetooth Special Interest Group, vol.0, 2014.

, Bluetooth 5 quadruples range, doubles speed, increases data broadcasting capacity by 800%, Bluetooth Special Interest Group, 2016.

S. Boonkrong and C. Somboonpattanakit, Dynamic salt generation and placement for secure password storing, International Journal of Computer Science, vol.43, issue.1, p.2016

, Advanced Solutions for Critical Infrastructure Protection: Complying with the North American Electric Reliability Corporation Critical Infrastructure Protection Standards, Entrust, 2012.

K. Fawaz, K. Kim, and K. Shin, Protection privacy of BLE device users, Proceedings of the Twenty-Fifth USENIX Security Symposium, pp.1205-1221, 2016.

N. Flor and H. Shannon, Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms, Journal of Digital Forensics, Security and Law, vol.6, issue.3, pp.79-85, 2011.
DOI : 10.15394/jdfsl.2011.1102

S. Gold, Android, a secure future at last? Engineering and Technology, pp.50-54, 2012.

K. Haataja, K. Hypponen, S. Pasanen, and P. Toivanen, Bluetooth Security Attacks: Comparative Analysis, Attacks and Countermeasures, 2013.
DOI : 10.1007/978-3-642-40646-1

K. Haataja and P. Toivanen, Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures, IEEE Transactions on Wireless Communications, vol.9, issue.1, pp.384-392, 2010.
DOI : 10.1109/TWC.2010.01.090935

D. Herrmann, Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience and ROI, 2007.
DOI : 10.1201/9781420013283

R. Heydon, Bluetooth Low Energy: The Developer's Handbook, Pearson Education, Upper Saddle River

. Jmaxxz, Backdooring the front door: Hacking a " perfectly secure " smart lock, presented at DEF CON 24, 2016.

C. Kaufman, R. Perlman, M. Speciner, and N. Security, , 2002.

, NSTAC Report to the President on Secure Government Communications

T. O. Connor, Violent Python: A Cookbook for Hackers, Forensic Analysts , Penetration Testers and Security Engineers, 2013.

P. Oehlert, Violating Assumptions with Fuzzing, IEEE Security and Privacy Magazine, vol.3, issue.2, pp.58-62, 2005.
DOI : 10.1109/MSP.2005.55

E. Onity and . Locks, , p.2016

J. Padgette, K. Scarfone, and L. Chen, Guide to Bluetooth Security, NIST Special Publication 800-121, Revision 1, National Institute of Standards and Technology, 2012.

G. Press, Internet of Things by the numbers: Markets estimates and forecasts , Forbes, 2014.

B. Ramsey, B. Mullins, W. Lowder, and R. Speers, Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking, 2014 IEEE Military Communications Conference, pp.104-109, 2014.
DOI : 10.1109/MILCOM.2014.24

B. Ramsey, B. Mullins, R. Speers, and K. Batterton, Watching for weaknesses in wild WPANs, Proceedings of the IEEE Military Communications Conference, pp.1404-1409, 2013.
DOI : 10.1109/milcom.2013.238

A. Rose and B. Ramsey, Picking Bluetooth Low Energy locks from a quarter mile away, presented at DEF CON 24, 2016.
DOI : 10.1007/978-3-319-70395-4_16

M. Ryan, Bluetooth: With low energy comes low security, Proceedings of the Seventh USENIX Conference on Offensive Technologies, 2013.

K. Townsend, C. Cufi, A. , and R. Davidson, Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking, O'Reilly Media, 2014.