“…It is an attempt to block tag's interaction with the corresponding reader by making tags impractical to be read, and hence, it is indispensable to ensure that RFID tags are not destroyed with an unlawful parity [124] Users or objects authentication [125] Near-Field Communication (NFC) (continued) Secure channel (authentication and encryption) [44] Relay S3, S4, S6, S7 Attackers redirect the calls from the readers of object to a malevolent one and replay backward its reply rapidly [126]. It severely relies on the implementation of the application protocol data unit instructions (ISO/IEC1443) Timing [127], distance bounding of cryptographic challenge-response couples [128] Man in the middle (MITM) S4, S6, S7 Adversary can capture the data, alter and send it to malevolent things in close vicinity making such attacks very complicated, encryption methods also make it difficult to succeed if they are fulfilled correctly [129] A secure channel between the NFC objects Data corruption All An attacker possesses the ability to disrupt communication channels between NFC-armed IoT devices by altering the transmitted data to be unreadable leading to a denial of services attack [130] The discovery of RF spheres throughout the communication of data [44] Data modification All An attacker possesses the ability to attacker modify the content of communicated data between NFC-armed IoT devices [131] Channel securing, Baud rate adjustment, constant checking of RF arena [44] (continued) An attacker attempt to inject some information into transmitted data when the NFC-armed device needs a long time to reply [130] Immediate entities response, securing the channel between two entities [130] Bluetooth Bluesnarfing All An attacker seeks to gain unlawful access to Bluetooth devices with the aim to capture their information and forward the incoming requests to another device [49] Setting mobiles on non-ascertainable style [49], keep on disconnected [64], validate next transmission BlueBugging All An adversary might use some weaknesses in legacy firmware to get into the victim's device to eavesdrop on phone calls, messages, emails, and link up to the internet without the awareness of the owner [49] Updating software and firmware, apply signatures to RF signals [132] Bluejacking S1, S2, S7, S10 An attacker can exploit the ability to transmit a radio business card to send an assault card; nonetheless, this necessitates the attacker to be very close i.e., within 10 m from the victim's device [49] Non-ascertainable style [49], keep on disconnected…”