Encryption Key Negotiation of Bluetooth Vulnerability - HR