Notice of Violation of IEEE Publication PrinciplesA new secure scheme purposed for recognition and authentication protocol in Bluetooth environment

Since its creation, Bluetooth has transformed itself from a cable replacement technology to a wireless technology that connects people and machines. Bluetooth has been widely adapted on mobile phones and PDAs. Many other vendors in other industries are integrating Bluetooth into their products. Although vendors are adapting to the technology, Bluetooth hasn't been a big hit among users. Security remains a major concern. Poor implementation of the Bluetooth architecture on mobile devices has led to some high profile Bluetooth hacks. Weak security protocol designs expose the Bluetooth system to some devastating protocol attacks [1]. Because some of these devices often contain sensitive personal or corporate information, security is always an issue when using Bluetooth with these devices. One issue with wireless technology is that signals might leak to outside of desired boundaries. These leaked signals can be used for various attacks ranging from eavesdropping to injecting traffic to fully impersonating another device. Over the years, several vulnerabilities have been discovered in the Bluetooth protocol design as well as the implementation of Bluetooth technology in applications. In this paper I will begin with briefly describing the Bluetooth protocol, explaining security measures in Bluetooth, and go into detail on specific analyze and discuss the vulnerabilities, and finally present an improvement pairing protocol that works with Encrypted Key Exchange Protocol. [24]