IJMTES – BLUE JACKING TECHNOL0GY

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : BLUE JACKING TECHNOLOGY

Author’s Name : Aishwarya Thakraniunnamed

Volume 04 Issue 04 2017

ISSN no :  2348-3121

Page no: 150-152

Abstract – Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of blue jacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A blue jacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

Key Words – Blue jacking,vCard,Bluetooth,OBEX Protocol, etc.,

References

  1. BluejackQ. http://www.bluejackq.com/ [referenced 4 Nov 2003]
  2. Clemson H, Coulton P, Edwards R, Chehimi F (2006) Mobslinger: the fastest mobile in the west. In: 1st world conference for fun ‘n games, Preston, UK, pp 47–54, 26–28 June 2006 (in press)
  3. Chehimi F, Coulton P, Edwards R (2006) Mobile advertising: practices, technologies and future potential. In: The 5th international conference on mobile business (ICMB 2006), Copenhagen, Denmark, 26–27 June 2006
  4. T. Bunker. Serious Flaws in Bluetooth Security Lead to Disclosure of Personal Data, 2006. http: //www.thebunker.net/security/bluetooth.htm.
  5. Gifford, Ian, (January 2, 2007) “IEEE Approves IEEE 802.15.1 Standard for Wireless Personal Area Networks Adapted from the Bluetooth® Specification”, IEEE, Retrieved on 10.02.06 from: http://standards.ieee.org/announcements/802151app.html
  6. Legg, Greg, (August 4, 2005) “The Bluejacking, Bluesnarfing, Bluebugging Blues: Bluetooth Faces Perception of Vulneability”, TechOnLine, Retrieved on 10.01.06 from: www.techonline.com./community/tech_topic/bluetooth/38467
Scroll Up