Security in Bluetooth
Authentication is based on identifying the device itself
and NOT its user.
Uses a challenge-response strategy
If a new device knows a secret authentication key, it is allowed
to join the piconet.
Encryption is the process of scrambling data using math
algorithms to ensure that the transmissions cannot be
easily intercepted and decoded.
The authentication key and the encryption key are two
different keys.