Date Added: Aug 2009
This paper aims to provide an overall understanding of the Bluetooth specification security architecture and its shortcomings. A technical foundation of the overall security architecture will be reviewed, primarily focusing on the standard's implementation of device authentication and encryption. The report then provides a brief review of the Security Modes and trust levels associated with the security architecture. Working from the foundation given, it then examines vulnerabilities inherent to the Bluetooth specification, along with the means by which these are exploited. Countermeasures to prevent these attacks are then discussed.