Abstract

Bluetooth is a wireless open standard communication radio specification designed to replace cables as a medium for data and voice signals transmission between electronic devices in a small distance. As with other wireless protocols, Bluetooth has some  vulnerabilities and has received its fair contribution of scrutiny over the years for network security limitation. Bluetooth implements discretion, verification and a pass-code source with algorithms custom based which is dependent on the SAFE alongside block cipher. Bluetooth key generation is generally based on a Bluetooth PIN, which must be entered into both devices. This procedure might be modified if one of the devices has a fixed PIN. The publication made available security information with Bluetooth and possible measures to ensure the standard of it performance.