Preface; Part I: Bluetooth Security Basics ; Introduction - Background. Bluetooth Basics. Security Basics.; Overview of Bluetooth Security Architecture - Purpose. Architecture. Security Modes.; Key Management - Pairing According to 1.1. Key Types. Usage., Link Protection , Key Data Bases.; Algorithms -Introduction to Crypto Algorithms. SAFER+. Bluetooth Encryption E0.; Broadcast Encryption - Overview. Key Size Negotiation. Switching to Broadcast Encryption.; Security Policies and Access Control - Security Manager Architecture.; Attacks, Weaknesses and Strengths - Eavesdropping. Impersonation. Man in the Middle Attacks. Key Storage. Unit Key. Location Tracking.; Part II: Bluetooth Security Enhancements; Introducing Anonymity - Overview, Inquiry and Paging. Modes.; Key Management Extensions - Improved Pairing. Higher Layer Key Exchange. Personal CA.; Security for Bluetooth Applications - Profiles.;