Bluejacking Technology IJERTCONV3IS28014
Bluejacking Technology IJERTCONV3IS28014
ISSN: 2278-0181
NSRCL-2015 Conference Proceedings
Bluejacking Technology
Aparna Joseph
Dept. of Computer Science
St.Mary’s College Thrissur,
Kerala,India
Abstract:- This research paper is about one of the new mobile effective range varies due to propagation conditions,
phone technology called Bluejacking . Mobile phones were material coverage, production sample variations, antenna
adopted as everyday technology, and they are widely used in configurations and battery conditions. Most Bluetooth
social situations, as users carry them around as they move to applications are for indoor conditions, where attenuation of
different places during the day. One such provision is
walls and signal fading due to signal reflections make the
BlueJacking, the practice of sending short, undesirable
messages by using the functionality of the business card to range far lower than specified line-of-sight ranges of the
other Bluetooth-enabled phones. We used mobile as a channel Bluetooth products. Bluetooth networking transmits data via
for communication in the early days , but today it developed low-power radio waves. It communicates on a frequency of
tremendously .Bluejacking can be done in Bluetooth enable 2.45 gigahertz (actually between 2.402 GHz and 2.480
devices.But the range of Bluetooth is very limited. GHz, to be exact). The 2.4 GHz radio frequency used by
Bluetooth is strongly absorbed by water.
Keywords:- Bluejacking, Bluejacker, Bluetooth, OBEX, vCard.
(B) OBEX Protocol:
I. INTRODUCTION
OBEX is a compact, efficient, binary protocol that enables a
Bluejacking is sending of unsolicited messages over wide range of devices to exchange
Bluetooth –compatible devices such as laptops,smartphones data in a simple and spontaneous manner. OBEX is
and PDAs.Bluejacking is done by an attacker termed as designed to fulfill the following major goals:
Bluejacker.Bluejacker chooses one of the available devices
and sends a message to a recipient, and remains close to 1. Application friendly - provide the key
observe the reaction expressed by any recipient.Recipient
does not have any information about bluejacker, name and 1. tools for rapid development of applications.
model of your mobile phone. Bluejacking was first 2. Compact - minimum strain on resources of small
conducted by a Malayasian IT consultant named ‘Ajack’ for devices.
the advertisement of Sony Ericsson.He did a Bluetooth 3. Cross platform.
search and discovered a Nokia 7650 .Then he created a new 4. Flexible data handling, including data typing and
contact as ‘Buy Ericsson’ to send the business card to Nokia 5. support for standardized types - this will allow
phone.A 13-year-old girl named Ellie from Surrey, UK has 6. devices to be simpler to use via more intelligent
created a website called ‘bluejackq’ where people can share handling of data inside.
their bluejacking experiences. 7. 5. Maps easily into Internet data transfer
protocols.
II. BLUEJACKING TECHNOLOGY 8. 6. Extensible - provide growth path to future
9. needs like security, compression, and other
The Bluetooth port of the mobile phones is subject to
extended
threat of Blue jacking attack. Bluejacker carefully crafts the
10. Features without burdening moreconstrained
identification that devices exchange during association and
implementations.
then transmits short, deceitful text messages into
11. Testable and Debuggable.
authentication dialogs. Thus,bluejacker tricks the user and
gains access to user’s phone book. Blue jacking is based on
It is a session protocol defined by IrDA. This protocol is
following technologies:
also utilized by the Bluetooth technology, making it possible
for applications to use either the Bluetooth radio technology
(A)Bluetooth:
. However, even though both IrDA and Bluetooth are
designed for short-range wireless communications, they
Bluetooth is a standard wire-replacement
have some fundamental differences relating to the lower-
communications protocol primarily designed for low-power
layer protocols. OBEX will therefore be mapped over the
consumption, with a short range based on low-
lower layer protocols which are adopted by Bluetooth
cost transceiver microchips in each device .It is designed for
The OBEX protocol follows a client/server request-response
very short range: around 10 meters on mobile phones and
paradigm for the conversation format. Devices supported by
100 meters on laptops with powerful transmitters.. The
OBEX protocol includes the following:
Bluejacking is a fun way to send messages to other people Fig(2):At receive’s phone when it is bluejacked.
using bluetooth, and without their pairing.The steps
involved in Bluejacking: III. APPLICATIONS OF BLUEJACKING
1. Select an area with plenty of multiple users. Bluejacking can be widely used in the different spectrums of
2. Go to contacts in your Address Book.Create a new marketing also.some of the cases are given below:
contact. 1. viral interaction: Bluejacking can be utilized to
3. Enter the message into the name part like exploit the communication paradigm between
“Bluejacked !!”.Save the new contact. consumers and producers to share content such as
4. Choose "send via Bluetooth". These searches for text, images, videos and Internet references.
any bluetooth device within range. Certain brands have already created multimedia
5. Choose one phone and send the contact.You will content that has very rapidly been circulated around
get the message "card sent" and then listen for the using bluejacking technology.
SMS message tone of your victim's phone.Look out
for the reactions in your victim. 2. Community Activities: Social Networking or
gaming events can be facilitated using Bluetooth as
a channel for potential participants to converse.
IV.CONCLUSION
V.ACKNOWLEDGEMENT
VI. REFERENCES