Analyzing BLE Vulnerabilities and Security Trade-offs