Bluetooth is one of the wireless technologies that users connect with one another through at a higher rate than with any other method when they are in close proximity to one another. This type of communication channel is susceptible to a variety of attacks, including Man-In-The-Middle (MITM) attacks and others of their ilk. On the other hand, live chatting has swiftly emerged as the most well-liked mode of text-based communication all over the world. As a consequence of this reality, one of the most significant challenges presented by wireless networks is preserving the authenticity of the data. It is not feasible to determine with absolute certainty whether or not malicious applications are capable of modifying older text that is preserved in a mobile database. This article presents a solution to the challenge of assuring the authenticity of Bluetooth text messages that is based on a distributed ledger technology (blockchain). The problem-solving strategy can be partitioned into two distinct parts. The first possibility involves sending and receiving text messages in real time using the Bluetooth channel of communication. The second type of distributed ledger is a hashing messages distributed ledger, which is based on blockchain technology and saves a hash of each and every message that is stored in the device database. This form of distributed ledger is a sort of distributed ledger for hashing messages.
Published in | American Journal of Electrical and Computer Engineering (Volume 6, Issue 2) |
DOI | 10.11648/j.ajece.20220602.11 |
Page(s) | 54-60 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Bluetooth, Blockchain, Text Messaging, Live Chatting
[1] | S. M. Idrees, M. Nowostawski and R. Jameel, "Blockchain-based digital contact tracing apps for COVID-19 pandemic management: issues, challenges, solutions, and future directions." JMIR medical informatics 9.2 2021. |
[2] | N. Mahajan, G. Verma, G. Erale, S. Bonde and D. Arya, "Design of Chatting Application Based on Android Bluetooth.", International Journal of Computer Science and Mobile Computing, Vol. 3 Issue. 3, 2014. |
[3] | R. Verma, R. Gupta, M. Gupta and R. Singh, A Complete Study of Chatting Room System based on Android Bluetooth, International Journal of Emerging Technology and Advanced Engineering, 2014. |
[4] | A. P. Takale and C. V. Vaidya, Decentralized Chat Application using Blockchain Technology, International Journal for Research in Engineering Application & Management (IJREAM), 2018. |
[5] | A. Bhat and A. Jain, BLUETOOTH NETWORK SECURITY, Journal of Analysis and Computation (JAC), 2020. |
[6] | S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008. |
[7] | M. M. O. a. M. A. OBAID, "Mobile Payment Using Blockchain Security," 2021. |
[8] | B. K. S. S. P. a. D. J. Mohanta, "An overview of smart contract and use cases in blockchain technology," 9th international conference on computing, communication and networking technologies (ICCCNT), 2018. |
[9] | T. A. A. T. H. Q. J. a. Q. Q. Khan, "A Hybrid Blockchain-based Zero Reconciliation Approach for an Effective Mobile Wallet.," 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), 2020. |
[10] | B. K. Mohanta, S. S. Panda and D. Jena, An Overview of Smart Contract and Use cases in Blockchain Technology, Bengaluru, India: 9th ICCCNT, 2018. |
[11] | A. M. Antonopoulos, Mastring Bitcoin, SECOND EDITION, O’Reilly, 2017. |
[12] | D. Han, H. Kim and J. Jang, Blockchain based Smart Door Lock system, International Conference on Information and Communication Technology Convergence (ICTC), 2017, pp. 1165-1167, doi: 10.1109/ICTC.2017.8190886., 2017. |
[13] | M. Stearns, A Decentralized Approach to Messaging Using Blockchain Technology, California State University, Northridge, 2019. |
[14] | Sourabh, D. Rawat, K. Kapkoti, S. Aggarwal and A. Khanna, bChat: A Decentralized Chat Application, International Research Journal of Engineering and Technology (IRJET), 2020. |
[15] | M. A. Albahar, K. Haataja and P. Toivanen, "Bluetooth Mitm Vulnerabilities: A Literature Review, Novel Attack Scenarios, Novel Countermeasures, And Lessons Learned", International Journal on Information Technologies & Security, № 4, 2016. |
[16] | Wetzel, M. Jakobsson and Susanne, "Security Weaknesses in Bluetooth,", Springer Berlin Heidelberg, 2002. |
APA Style
Raed Rasheed, Raed Bulbul, Mohammad Mikki. (2022). Bluetooth Text Messages Integrity Security (BTMIS) Based on Blockchain. American Journal of Electrical and Computer Engineering, 6(2), 54-60. https://doi.org/10.11648/j.ajece.20220602.11
ACS Style
Raed Rasheed; Raed Bulbul; Mohammad Mikki. Bluetooth Text Messages Integrity Security (BTMIS) Based on Blockchain. Am. J. Electr. Comput. Eng. 2022, 6(2), 54-60. doi: 10.11648/j.ajece.20220602.11
@article{10.11648/j.ajece.20220602.11, author = {Raed Rasheed and Raed Bulbul and Mohammad Mikki}, title = {Bluetooth Text Messages Integrity Security (BTMIS) Based on Blockchain}, journal = {American Journal of Electrical and Computer Engineering}, volume = {6}, number = {2}, pages = {54-60}, doi = {10.11648/j.ajece.20220602.11}, url = {https://doi.org/10.11648/j.ajece.20220602.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajece.20220602.11}, abstract = {Bluetooth is one of the wireless technologies that users connect with one another through at a higher rate than with any other method when they are in close proximity to one another. This type of communication channel is susceptible to a variety of attacks, including Man-In-The-Middle (MITM) attacks and others of their ilk. On the other hand, live chatting has swiftly emerged as the most well-liked mode of text-based communication all over the world. As a consequence of this reality, one of the most significant challenges presented by wireless networks is preserving the authenticity of the data. It is not feasible to determine with absolute certainty whether or not malicious applications are capable of modifying older text that is preserved in a mobile database. This article presents a solution to the challenge of assuring the authenticity of Bluetooth text messages that is based on a distributed ledger technology (blockchain). The problem-solving strategy can be partitioned into two distinct parts. The first possibility involves sending and receiving text messages in real time using the Bluetooth channel of communication. The second type of distributed ledger is a hashing messages distributed ledger, which is based on blockchain technology and saves a hash of each and every message that is stored in the device database. This form of distributed ledger is a sort of distributed ledger for hashing messages.}, year = {2022} }
TY - JOUR T1 - Bluetooth Text Messages Integrity Security (BTMIS) Based on Blockchain AU - Raed Rasheed AU - Raed Bulbul AU - Mohammad Mikki Y1 - 2022/07/13 PY - 2022 N1 - https://doi.org/10.11648/j.ajece.20220602.11 DO - 10.11648/j.ajece.20220602.11 T2 - American Journal of Electrical and Computer Engineering JF - American Journal of Electrical and Computer Engineering JO - American Journal of Electrical and Computer Engineering SP - 54 EP - 60 PB - Science Publishing Group SN - 2640-0502 UR - https://doi.org/10.11648/j.ajece.20220602.11 AB - Bluetooth is one of the wireless technologies that users connect with one another through at a higher rate than with any other method when they are in close proximity to one another. This type of communication channel is susceptible to a variety of attacks, including Man-In-The-Middle (MITM) attacks and others of their ilk. On the other hand, live chatting has swiftly emerged as the most well-liked mode of text-based communication all over the world. As a consequence of this reality, one of the most significant challenges presented by wireless networks is preserving the authenticity of the data. It is not feasible to determine with absolute certainty whether or not malicious applications are capable of modifying older text that is preserved in a mobile database. This article presents a solution to the challenge of assuring the authenticity of Bluetooth text messages that is based on a distributed ledger technology (blockchain). The problem-solving strategy can be partitioned into two distinct parts. The first possibility involves sending and receiving text messages in real time using the Bluetooth channel of communication. The second type of distributed ledger is a hashing messages distributed ledger, which is based on blockchain technology and saves a hash of each and every message that is stored in the device database. This form of distributed ledger is a sort of distributed ledger for hashing messages. VL - 6 IS - 2 ER -