作者
Hasbiha Hossain, Upama Kabir, Shaila Rahman
发表日期
2011
期刊
International Journal of Computer and Information Technology
卷号
1
期号
2
简介
Bluetooth wireless technology is an inexpensive, short-range radio technology that eliminates the need for proprietary cabling between devices such as notebook PCs, hand held PCs, personal digital assistants (PDAs), cameras, and printers etc. This thesis paper provides an overview of Bluetooth technology, protocol stack, some of the Vulnerabilities, risks and also protection technique of bluetooth enables mobile phones. Bluetooth enable mobile phone exchanges important data or files, image, sms, personal videos etc. When bluetooth is turn on, it is time to attack from attacker. Some brilliant attacker wants to take scope to harm bluetooth enable mobile phones by using proper steps. BlueBug is the name of a bluetooth security loophole on some bluetooth enabled cell phones. By bluebug attack, a mobile phone can be damaged or lost important information. Not only they can make calls, they can send messages, read phone books, examine calendars, etc. When a user put balance in mobile, it can be make zero by bluebug attack. It is a dangerous attack. Attacker uses rfcomm for communication between two devices. But bluetooth rfcomm has no authentication and attacker use this scope. In this thesis my vision is to protect bluetooth enable device from attacker by proposing a modified approach of RFCOMM implementation.
引用总数
20122013201420152016201720182019202031
学术搜索中的文章