Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/7439
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Khanpara, Pimal | - |
dc.contributor.author | Khanpara, Param | - |
dc.date.accessioned | 2017-02-23T09:32:24Z | - |
dc.date.available | 2017-02-23T09:32:24Z | - |
dc.date.issued | 2015-05 | - |
dc.identifier.issn | 2347 – 8616 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/7439 | - |
dc.description | International Journal of Innovations & Advancement in Computer Science, IJIACS, Vol. 4, Special Issue, Page No. 220 - 227. | en_US |
dc.description.abstract | Bluetooth technology is designed and optimized for use in mobile devices such as mobile computers, cellular handsets, network access points, printers, PDAs, desktops, keyboards, joysticks and virtually any other device. The Bluetooth protocol uses a combination of circuit and packet switching to send/receive data. The Bluetooth Protocol Architecture includes radio, baseband, link manager, logical link control and adaptation (L2CAP), Host Controller Interface (HCI), TCP,SDP,RFCOMM and application layers. Bluetooth technology has grown through the years, but because of the increase, security has become an issue. There are different vulnerabilities in the design already, which have been maliciously exploited. One of these exploits is Bluejacking. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Various software tools are available for Bluejacking. Bluejacking can be used for sending business cards, as a marketing channel, as a medium for performing community activities and providing location based services. There are some codes of ethics which need to be followed by an ethical bluejacker. This paper studies all the concepts and issues related to Bluejacking. | en_US |
dc.publisher | Academic Science | en_US |
dc.relation.ispartofseries | ITFCE036-2; | - |
dc.subject | Bluetooth | en_US |
dc.subject | Bluejacking | en_US |
dc.subject | Computer Faculty Paper | en_US |
dc.subject | Faculty Paper | en_US |
dc.subject | ITFCE036 | en_US |
dc.title | BlueJacking | en_US |
dc.type | Faculty Papers | en_US |
Appears in Collections: | Faculty Papers, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFCE036-2.pdf | ITFCE036-2 | 289.89 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.