##plugins.themes.academic_pro.article.main##
Abstract
In this paper we present a survey on Bluetooth technology regarding the threats and
vulnerability attacks during data transfer on its security mechanism. Bluetooth technology uses the
personal area network (PAN). It is the kind of wireless Ad-hoc network. Low cost, low power, low
complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth
Technology has many benefits like replacement of cable, easy file sharing, wireless synchronization and
internet connectivity. As Bluetooth Technology becomes widespread, vulnerabilities in its security
protocols are increasing which can be potentially dangerous to the privacy of a user’s personal
information. Security in Bluetooth communication has been an active area of research for last few years.
The article presents various security threats and vulnerability attacks on Bluetooth technology and also
how to restrict them