This document discusses Bluetooth security. It provides an overview of Bluetooth specification and operation, including defining piconets and the 2.4 GHz frequency band. It then discusses Bluetooth security concepts like authentication, authorization, and symmetric key security. The document outlines security threats to Bluetooth like disclosure, integrity threats, and denial of service. It describes the Bluetooth security protocol and weaknesses like discoverability, lack of integrity checking, and man-in-the-middle attacks. It calls for more research on secure and lightweight protocols to address current Bluetooth security issues.