Modified Approach of RFCOMM Implementation to Protect Bluetooth Technology from Bluebug Attack

Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, Personal Digital Assistants (PDAs), cameras, and printers, etc. This paper provides an overview of Bluetooth technology, protocol stack, some of the vulnerabilities, risks and also protection technique of Bluetooth-enabled mobile phones. Bluetooth-enabled mobile phone exchanges important data or files, image, sms, personal videos, etc. When Bluetooth is turned on, it is time to attack from attacker.

Provided by: University of Asia and the Pacific Topic: Mobility Date Added: Feb 2011 Format: PDF

Find By Topic