Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures | IEEE Conference Publication | IEEE Xplore