Modified Approach of RFCOMM Implementation to Protect Bluetooth Technology from Bluebug Attack

Download Now Date Added: Feb 2011
Format: PDF

Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, Personal Digital Assistants (PDAs), cameras, and printers, etc. This paper provides an overview of Bluetooth technology, protocol stack, some of the vulnerabilities, risks and also protection technique of Bluetooth-enabled mobile phones. Bluetooth-enabled mobile phone exchanges important data or files, image, sms, personal videos, etc. When Bluetooth is turned on, it is time to attack from attacker.