In this paper, we give a short overview of the security architecture of
Bluetooth. We will especially focus on the key exchange protocol in Bluetooth.
This is the most important security critical part of the security architecture.
Unfortunately, there are a lot of security flaws in the Bluetooth standard. Some
are rather theoretical, but most of the problems can be exploited by an
attacker. An extensive overview of the security flaws in Bluetooth will be given
in this paper. Some of these security problems, e.g. the Bluesnarf attack, were
only discovered very recently.