In todays quickly developing world it is very important to keep track and change the architecture and security features of any system periodically because of the immense number of people trying to reverse engineer things to suit their own needs.In this document i have tried to provide an overview of the developing security architectures in Blutooth systems over the years and the flaws presented in previous designs.It also covers aspects of case studies which give an overview of the failures of previous security designs and how they have been improved upon.