wireless applications. While many of the basic
requirements can be met by techniques similar to those
employed in wired applications, challenges and new
opportunities remain. In this talk we highlight
several areas of recent research. At first we point to
several vulnerabilities in the current Bluetooth
standard which make eavesdropping, impersonation and
location attacks possible. We then discuss methods for
key establishment which can be used
to improve the security not only of the Bluetooth
standard but wireless communication in general.