Modified Approach of RFCOMM Implementation to Protect Bluetooth Technology from Bluebug Attack
Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, Personal Digital Assistants (PDAs), cameras, and printers, etc. This paper provides an overview of Bluetooth technology, protocol stack, some of the vulnerabilities, risks and also protection technique of Bluetooth-enabled mobile phones. Bluetooth-enabled mobile phone exchanges important data or files, image, sms, personal videos, etc. When Bluetooth is turned on, it is time to attack from attacker.