International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 7 | Year 2013 | Article Id. IJETT-V4I7P148 | DOI : https://doi.org/10.14445/22315381/IJETT-V4I7P148

Bluejacking Technology: Overview, Key Challenges and Initial Research


Ratika Bali

Citation :

Ratika Bali, "Bluejacking Technology: Overview, Key Challenges and Initial Research," International Journal of Engineering Trends and Technology (IJETT), vol. 4, no. 7, pp. 3020-3024, 2013. Crossref, https://doi.org/10.14445/22315381/IJETT-V4I7P148

Abstract

The mobile phone technology has developed tremendously in the past forty years since its invention in 1973 owing to its unique, wiring sans and fixation free networked system. Mobile phones have been espoused as an everyday technology, omnipresent at every physical location. Initiall y used merely as a communicative device to facilitate a channel for mediated conversation, the usage of mobile phones has been diversified progressively. One such appropriation is bluejacking, the technique of relaying anonymous, unwanted and unsolicited s hort messages via vCard functionality over Bluetooth to Bluetooth - enabled devices using the OBEX (OBject EXchange) protocol. This paper provides an overview of the Bluejacking Technology .


Keywords

Bluejacking, Bluejackaddict, Bluetooth Exchange, OBEX, vCard.

References

[1] Information Security Management Handbook, Sixth Edition. Edited by Harold F. Tipton, Micki Krause.
[2] Do You Speak American? Words That Shouldn`t Be? Sez Who? Cyberspace | PBS .
[3] http://en.wikipedia.org/wiki/OBject_EXchange#Supported_devices , Devices supported by OBEX protocol.
[4] Ariadn Web Magazine for Information Professionals Overview of content related to `vcard` .
[5] Mining Bluetooth Attacks in Smart Phone s , Seyed Morteza Babamir, Reyhane Nowrouzi, Hadi Naseri .
[6] https://www.bluetooth.org/apps/content/ , Bluetooth Special Interest Group.
[7] Guide to Bluetooth Security, Special Publication 800 - 121, National I nstitute of Standards and Technology, U.S. Department of Commerce.
[8] Bluejacking ‘a harmless prank` By Stephen Whitford, IT Web Journalist.
[9] PocketMagic . Bluetooth BlueJacking. By Radu Motisan. September 16th, 2008.
[10] Bluetooth group drops ultrawideband, eyes 6 0 GHz, Report: Ultrawideband dies by 2013, Incisor Magazine November 2009 .

Time: 0.0014 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB