Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/7439
Title: BlueJacking
Authors: Khanpara, Pimal
Khanpara, Param
Keywords: Bluetooth
Bluejacking
Computer Faculty Paper
Faculty Paper
ITFCE036
Issue Date: May-2015
Publisher: Academic Science
Series/Report no.: ITFCE036-2;
Abstract: Bluetooth technology is designed and optimized for use in mobile devices such as mobile computers, cellular handsets, network access points, printers, PDAs, desktops, keyboards, joysticks and virtually any other device. The Bluetooth protocol uses a combination of circuit and packet switching to send/receive data. The Bluetooth Protocol Architecture includes radio, baseband, link manager, logical link control and adaptation (L2CAP), Host Controller Interface (HCI), TCP,SDP,RFCOMM and application layers. Bluetooth technology has grown through the years, but because of the increase, security has become an issue. There are different vulnerabilities in the design already, which have been maliciously exploited. One of these exploits is Bluejacking. Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Various software tools are available for Bluejacking. Bluejacking can be used for sending business cards, as a marketing channel, as a medium for performing community activities and providing location based services. There are some codes of ethics which need to be followed by an ethical bluejacker. This paper studies all the concepts and issues related to Bluejacking.
Description: International Journal of Innovations & Advancement in Computer Science, IJIACS, Vol. 4, Special Issue, Page No. 220 - 227.
URI: http://hdl.handle.net/123456789/7439
ISSN: 2347 – 8616
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCE036-2.pdfITFCE036-2289.89 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.