Table of contents: 1.Introduction 2.Overview of Bluetooth Security 3.Reasons for Bluetooth Network Vulnerabilities 3.1.Vulnerability to Eavesdropping 3.2.Weaknesses in Encryption Mechanisms 3.3.Weaknesses in PIN Code Selection 3.4.Weaknesses in Association Models of SSP 3.5.Weaknesses in Device Configuration 4.Comparative Analysis of Bluetooth Security Attacks 4.1.Disclosure Threats …