This proposed method enhanced the SSP to authenticate the
public keys of the communicating parties. ESSP contains two
phases to secure the exchange of public keys. The first phase of
the ESSP applies before the SSP process started. During the
process of this phase, the new devices used by users are added
to the Personal Area Network (PAN). Mean while the second
phase is applied during the exchange of the public keys in SSP.