One of the more challenging aspects of Bluetooth security is dealing with practical attacks. Man-In-The-Middle attacks represent some of the challenging attacks on Bluetooth and BLE that product developers deal with.
https://www.thyrasec.com/blog/a-guide-t ... ddle-mitm/