Key Negotiation of Bluetooth Vulnerability