0% found this document useful (0 votes)
117 views3 pages

Bluejacking Technology IJERTCONV3IS28014

This document discusses the technology of bluejacking, which involves sending unsolicited messages to Bluetooth-enabled devices without permission. It describes how bluejacking works using Bluetooth technology and protocols like OBEX and vCards. Specifically, it explains that a bluejacker can craft identifiers to trick a user's phone into accepting messages and then transmit short texts. The document also outlines some applications of bluejacking, such as viral marketing interactions and wireless information sharing, while noting related technologies like effective Bluetooth range and frequency.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views3 pages

Bluejacking Technology IJERTCONV3IS28014

This document discusses the technology of bluejacking, which involves sending unsolicited messages to Bluetooth-enabled devices without permission. It describes how bluejacking works using Bluetooth technology and protocols like OBEX and vCards. Specifically, it explains that a bluejacker can craft identifiers to trick a user's phone into accepting messages and then transmit short texts. The document also outlines some applications of bluejacking, such as viral marketing interactions and wireless information sharing, while noting related technologies like effective Bluetooth range and frequency.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Special Issue - 2015 International Journal of Engineering Research & Technology (IJERT)

ISSN: 2278-0181
NSRCL-2015 Conference Proceedings

Bluejacking Technology
Aparna Joseph
Dept. of Computer Science
St.Mary’s College Thrissur,
Kerala,India

Abstract:- This research paper is about one of the new mobile effective range varies due to propagation conditions,
phone technology called Bluejacking . Mobile phones were material coverage, production sample variations, antenna
adopted as everyday technology, and they are widely used in configurations and battery conditions. Most Bluetooth
social situations, as users carry them around as they move to applications are for indoor conditions, where attenuation of
different places during the day. One such provision is
walls and signal fading due to signal reflections make the
BlueJacking, the practice of sending short, undesirable
messages by using the functionality of the business card to range far lower than specified line-of-sight ranges of the
other Bluetooth-enabled phones. We used mobile as a channel Bluetooth products. Bluetooth networking transmits data via
for communication in the early days , but today it developed low-power radio waves. It communicates on a frequency of
tremendously .Bluejacking can be done in Bluetooth enable 2.45 gigahertz (actually between 2.402 GHz and 2.480
devices.But the range of Bluetooth is very limited. GHz, to be exact). The 2.4 GHz radio frequency used by
Bluetooth is strongly absorbed by water.
Keywords:- Bluejacking, Bluejacker, Bluetooth, OBEX, vCard.
(B) OBEX Protocol:
I. INTRODUCTION
OBEX is a compact, efficient, binary protocol that enables a
Bluejacking is sending of unsolicited messages over wide range of devices to exchange
Bluetooth –compatible devices such as laptops,smartphones data in a simple and spontaneous manner. OBEX is
and PDAs.Bluejacking is done by an attacker termed as designed to fulfill the following major goals:
Bluejacker.Bluejacker chooses one of the available devices
and sends a message to a recipient, and remains close to 1. Application friendly - provide the key
observe the reaction expressed by any recipient.Recipient
does not have any information about bluejacker, name and 1. tools for rapid development of applications.
model of your mobile phone. Bluejacking was first 2. Compact - minimum strain on resources of small
conducted by a Malayasian IT consultant named ‘Ajack’ for devices.
the advertisement of Sony Ericsson.He did a Bluetooth 3. Cross platform.
search and discovered a Nokia 7650 .Then he created a new 4. Flexible data handling, including data typing and
contact as ‘Buy Ericsson’ to send the business card to Nokia 5. support for standardized types - this will allow
phone.A 13-year-old girl named Ellie from Surrey, UK has 6. devices to be simpler to use via more intelligent
created a website called ‘bluejackq’ where people can share handling of data inside.
their bluejacking experiences. 7. 5. Maps easily into Internet data transfer
protocols.
II. BLUEJACKING TECHNOLOGY 8. 6. Extensible - provide growth path to future
9. needs like security, compression, and other
The Bluetooth port of the mobile phones is subject to
extended
threat of Blue jacking attack. Bluejacker carefully crafts the
10. Features without burdening moreconstrained
identification that devices exchange during association and
implementations.
then transmits short, deceitful text messages into
11. Testable and Debuggable.
authentication dialogs. Thus,bluejacker tricks the user and
gains access to user’s phone book. Blue jacking is based on
It is a session protocol defined by IrDA. This protocol is
following technologies:
also utilized by the Bluetooth technology, making it possible
for applications to use either the Bluetooth radio technology
(A)Bluetooth:
. However, even though both IrDA and Bluetooth are
designed for short-range wireless communications, they
Bluetooth is a standard wire-replacement
have some fundamental differences relating to the lower-
communications protocol primarily designed for low-power
layer protocols. OBEX will therefore be mapped over the
consumption, with a short range based on low-
lower layer protocols which are adopted by Bluetooth
cost transceiver microchips in each device .It is designed for
The OBEX protocol follows a client/server request-response
very short range: around 10 meters on mobile phones and
paradigm for the conversation format. Devices supported by
100 meters on laptops with powerful transmitters.. The
OBEX protocol includes the following:

Volume 3, Issue 28 Published by, www.ijert.org 1


Special Issue - 2015 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NSRCL-2015 Conference Proceedings

1. All Palms since Palm III, except the Palm


Pre, Palm Pre Plus, Palm Pixi and Palm
Pixi Plus.
2. Most Sharp, Motorola, Samsung, Sony
Ericsson, HTC and Nokia phones with
infrared or Bluetooth port.
3. LG EnV Touch (VX11000)
4. Many other PDAs since 2003.
5. Android devices in version 2.1 and above.
6. Windows Phone 7.8 and 8 devices (limited to the
transferring of pictures, music and videos via a
'Bluetooth Share' app).

(C). vCard Functionality:

vCard is a file format standard for electronic business cards.


vCards are often attached to e-mail messages, but can be
exchanged in other ways, such as on the World Wide Web
or instant messaging. They can contain name and address
information, phone numbers, e-mail addresses, URLs, logos, fig (1):sending through Bluetooth
photographs, and audio clips.
vCard was developed by a consortium founded by
Apple, AT&T, IBM, and Siemens, which turned the
specification over to an industry group, the Internet Mail
Consortium (IMC) in 1996.To open (look at) a vCard that
someone has attached to an e-mail note, your e-mail program
needs to support vCards and not all such programs do yet.
However, if you have an online address book or personal
information manager that supports vCards, you can move it
to that program for viewing or for addition to that program's
database.
A promising future use of a vCard will be as a way to
quickly fill in application forms on the Web. Just drag-and-
drop your own vCard to the form and you won't have so
many blanks to fill in. For software developers, there is a
Personal Data Interchange (PDI) Software Development Kit
(SDK).

(D)How Bluejacking can be done:

Bluejacking is a fun way to send messages to other people Fig(2):At receive’s phone when it is bluejacked.
using bluetooth, and without their pairing.The steps
involved in Bluejacking: III. APPLICATIONS OF BLUEJACKING

1. Select an area with plenty of multiple users. Bluejacking can be widely used in the different spectrums of
2. Go to contacts in your Address Book.Create a new marketing also.some of the cases are given below:
contact. 1. viral interaction: Bluejacking can be utilized to
3. Enter the message into the name part like exploit the communication paradigm between
“Bluejacked !!”.Save the new contact. consumers and producers to share content such as
4. Choose "send via Bluetooth". These searches for text, images, videos and Internet references.
any bluetooth device within range. Certain brands have already created multimedia
5. Choose one phone and send the contact.You will content that has very rapidly been circulated around
get the message "card sent" and then listen for the using bluejacking technology.
SMS message tone of your victim's phone.Look out
for the reactions in your victim. 2. Community Activities: Social Networking or
gaming events can be facilitated using Bluetooth as
a channel for potential participants to converse.

Volume 3, Issue 28 Published by, www.ijert.org 2


Special Issue - 2015 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NSRCL-2015 Conference Proceedings

IV.CONCLUSION

Bluejacking does not delete or change any data from the


device. Bluejackers often look for reception of the phone
user . It can be said that bluejacking is not at all harmful. By
it, we can interact with new people. The only thing it can do
at worst is to irritate you or annoy you by sending unsolicited
messages but you can still prevent yourselves from these
messages by changing the visibility of your Bluetooth to
invisible or non-discoverable mode. It can be helpful as well
by providing you with lots of useful information as well. So,
use this technology properly as it is intended and get best of
it, rather than just making wrong use of it and irritating
others.

V.ACKNOWLEDGEMENT

I would like to acknowledge the contribution of all the


people who have helped in reviewing this paper. I would like
to give sincere thanks to Mis .Betsy Binu our head of
department for her guidance and support throughout this
paper. I would also like to thank our families and friends
who supported us in the course of writing this paper.

VI. REFERENCES

[1] (IJETT)-Volume 4 Issue 7 –July 2013 ISSN:2231-5381


http://www.ijettjournal.org Bluejacking
Technology:Overview,Key Challenges and Initial Research.
[2] www.ijarcsse.com-the trends on bluejacking technology.
[3] www.ijecs.in-the new and clear approach to b luejacking.
[4] http://www.wikihow.com/Bluejack
[5] http.//www.wikipedia.org/wiki/obex.
[6] http.//www.wikipedia.org/wiki/vcard functionality.
[7] http.//www.wikipedia.org/wiki/Bluetooth
[8] http://whatis.techtarget.com/definition/vCard

Volume 3, Issue 28 Published by, www.ijert.org 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy