0% found this document useful (0 votes)
18 views18 pages

Seminar

The technical seminar report on Bluejacking, submitted by Anjali Rajendra Kamtikar for her Bachelor of Technology in Computer Science and Engineering, explores the practice of sending unsolicited messages via Bluetooth to nearby devices. It covers the origins of Bluejacking, the technology behind Bluetooth, and practical methods for executing Bluejacking, while also acknowledging the guidance received from faculty members. The report highlights the ethical considerations and potential uses of Bluejacking in social contexts.

Uploaded by

oldxmonk49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views18 pages

Seminar

The technical seminar report on Bluejacking, submitted by Anjali Rajendra Kamtikar for her Bachelor of Technology in Computer Science and Engineering, explores the practice of sending unsolicited messages via Bluetooth to nearby devices. It covers the origins of Bluejacking, the technology behind Bluetooth, and practical methods for executing Bluejacking, while also acknowledging the guidance received from faculty members. The report highlights the ethical considerations and potential uses of Bluejacking in social contexts.

Uploaded by

oldxmonk49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Technical Seminar Report

ON

Bluejacking
Submitted in fulfillment of the
Requirements for the award of the degree of

Bachelor of Technology

In

Computer Science and Engineering

By
Anjali Rajendra kamtikar
Rollno: 61

Under The Guidance of

Prof. S.N. Nagure

M. S. BIDVE ENGINEERING COLLEGE, LATUR


CERTIFICATE

This is to certify that the technical seminar entitled “Bluejacking ” has been presented by
Anjali Rajendra Kamtikar Rollno:61 partial fulfillment of the requirements for the award of
degree of Bachelor of Technology in Computer Science and Engineering for academic year
2024-25 from M. S. Bidve Engineering College, Latur, Maharashtra.

Prof. S.N. Nagure Prof. N.G. Dharashive


GUIDE H.O.D

Prof.Suresh Halhalli
PRINCIPAL

M. S. BIDVE ENGINEERING COLLEGE, LATUR


ACKNOWLEDGEMENT

First of all, I am indebted to the GOD ALMIGHTY for giving me anopportunity to excel in my
efforts to complete this seminar on time. I am extremely grateful to Prof. Dr. S. R. Halhalli the
principal of the college, M.S. Bidve Engineering college, and Prof .N.G. Dharashive

Head of Department, Department of CSE FY , for providing all the required resources for the
successful completion of my seminar.My heartfelt gratitude to my seminar guide Prof. S.N.
Nagure for Guidance in the preparation of the seminar report. .I will be failing in duty if I do
not acknowledge with grateful thanks to theauthors of the references and other literatures
referred to in this seminar.Last but not the least; I am very much thankful to my parents who
guidedme in every step which I took.

Thanking You,
ANJALI RAJENDRA KAMTIKAR

TABLE OF CONTENT
 Certificate 1

 Acknowledgement 2

 ABSTRACT: 3
 Introduction
4
 List of Figures

 Origin 5

 Blue jacking Technology

 Bluetooth Technology
6 to 8
 What is Bluetooth?

 Bluetooth Piconets

 How to blue jack 9

 Mobile Phones 10
 Personal Computers/Laptops 11
 Software Tools 12
 Blue Spam 13
 Meeting Point
 Free jack Easy jacking 14
 Usage of blue jacking 15 to 18
 Codes of ethics 19 to 20

 Related concepts 21 to 24
ABSTRACT:

Bluejacking is sending of unsolicited messages over Bluetooth –compatible devices such


aslaptops,smartphones and PDAs.Bluejacking is done by an attacker termed as
Bluejacker.Bluejackerchooses one of the available devices and sends a message to a recipient,
and remains close to observe thereaction expressed by any recipient.Recipient does not have
any information about bluejacker, name andmodel of your mobile phone. Bluejacking was first
conducted by a Malayasian IT consultant named Ajack‟for the advertisement of Sony
Ericsson.He did a Bluetooth search and discovered a Nokia 7650 .Then hecreated a new
contact as „Buy Ericsson‟ to send the business card to Nokia phone.A 13-year-old girlnamed
Ellie fromSurrey, UK has created a website called „bluejacking‟ where people can share their
bluejacking experience.

INTRODUCTION:
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-
enabled devices such as mobile phones, PDAs or laptop computers, sending a
vCard which typically contains a message in the name field (l.e. for bluedating or
bluechat) to another Bluetooth enabled device via the OBEX protocol, Bluetooth
has a very limited range; usually around 10 meters on mobile phones, but laptops
can reach up to 100 meters with powerful transmitters. Bluejacking allows phone
users to send business cards anonymously using Bluetooth wireless. Technology.
Bluejacking does not involve the removal or alteration of any data from the
device. Bluejackers often look for the receiving phone to ping or the user to react.
In order to carry out a bluejacking, the sending and receiving devices must be
within 10 meters of one another. Phone owners who receive bluejack messages
should refuse to add the contacts to their address book. Devices that are set in
nondiscoverable mode are not susceptible to bluejacking. Mobile phones have
been adopted as an everyday technology, and they are ubiquitous in social
situations as users carry them around as they move through different physical
locations throughout the day. As a communicative device, the mobile phone has
been gradually taken up in ways that move beyond merely providing a channel
for mediated conversation. One such appropriation is bluejacking, the practice of
sending short, unsolicited messages via vCard functionality to other Bluetooth-
enabled phones. To choose the recipients of bluejacks, senders. Complete a scan
using their mobile phones to search for the available Bluetoothenabled devices in
the immediate area. A bluejacker picks one of the available devices, composes a
message within a body of the phone’s contact interface, sends the message to the
recipient, and remains in the vicinity to observe any reactions expressed by the
recipient. The messages tend to be anonymous since the recipient has no idea
who has sent the bluejack, and the recipient has no information about the
bluejacker, except for the name and model of the bluejacker’s mobile phone.
Because of Bluetooth’s short-range networking capabilities, bluejacking can only
occur between actors who are within 10 meters of each other, which makes this
activity highly location-dependent. Contrary to what the name suggests, the
bluejack recipient's phone is not hijacked; that is, the phone is at no time
under the control of the Bluejacker.

ORIGINE :

This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a
comment on a mobile. Phone forum. Ajack told IT Web that he used his Ericsson cellphone in a
bank to send a message to someone with a Nokia 7550. Becoming bored while standing in a
bank queue, Ajack did a Bluetooth discovery to see if there was another Bluetooth device
around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first
name with „Buy Ericsson!‟ and sent a business card to the Nokia phone. “A guy a few feet
away from me suddenly had his 7650 beep. He took out his 7650 and started looking at his
phone. I couldn‟t contain myself and left the bank,” he says. Ajack then posted the story on a
mobile Web site and other people started trying it out. “I gave it the name bluejacking (taken
from the words Bluetooth and hijacking) and it has just taken off from there.” He says
bluejacking is common in Malaysia and is happening everywhere there are lots of Bluetooth
devices. Bluejacking has become popular among young people wanting to play practical jokes.
A 13year-old named Ellie from Surrey in the UK has started a dedicated bluejacking site called
bluejackq. The site explains what bluejacking is and also has forums where people can share
their bluejacking experiences

BLUEJACKING TECHNOLOGY :

As we know that bluejacking is the sending of unsolicited messages over Bluetooth to


Bluetooth-enabled devices. Such as mobile phones, PDAs or laptop computers, sending a

vCard which typically contains a message in the name field (i.e. for bluedating or bluechat)
to another Bluetooth enabled device via the OBEX protocol. So bluejacking is based on

Bluetooth technology which is explained bellow.

Bluetooth technology

Bluetooth Technology was developed to solve the simple problem of eliminating the connector
cable. The ideas to replace the cables that are needed to accompany portable devices carried by
many mobile travelers with a low- ost, secure, robust RF link, Originally Bluetooth marketed
to small handheld devices such as cell phones and laptop. As the Bluetooth standard emerged
successfully into society, the world demanded more. It is reported on Lets Go Digital In an
article written by Ilse Jurrien that three new Bluetooth products are qualified every day and 10
million Bluetooth units are shipped per week. Bluetooth is sa efficient, effective, and secure
that even the IEEE approved the 802.15.1 Standard for Wireless Person Area Networks based
on the Bluetooth specification.

What is Bluetooth? : Bluetooth is defined as a wireless technology that provides short-


range communications intended to replace the cables connecting portable and/or fixed devices
while maintaining high levels of security. There are three key features of Bluetooth; robustness,
low power, and low cost. The Bluetooth standard provides a uniform structure enabling a wide
variety of devices to seamlessly, and wirelessly, connect and communication with each other.
Bluetooth devices. Connect and communicate via RF link through short-range piconets.
Bluetooth devices have the ability to connect with up to seven devices per piconet. Each of
these devices can also be simultaneously connected to other piconets. The piconet itself is
established dynamically and automatically as Bluetooth enables devices enter and leave the
range In which its radio operates. The major pro of Bluetooth is the ability to be full duplex and
handle both data and voice transmission simultaneously. The differentiation of Bluetooth from
other wireless standards such as Wi-fi is that the Bluetooth standard gives both link layer and
application layer definitions which support data and voice applications. Bluetooth comes in
two core versions; Version 2.0 + Enhanced Data Rate and Version 1.2. The primary differences.
Being Bluetooth 2.0 has a data rate of 3 Mega byte per second whereas Version 1.2 has only a 1
Mega byte per second data rate. Both are equipped with extended Synchronous Connections
(ESCO), which improves voice quality of audio . Links by allowing retransmissions of
corrupted packets.Bluetooth technology operates in the unlicensed industrial, scientific and
medical (ISM) band at 2.4 to 2.485 GHz, Using a spread spectrum, frequency hopping, full-
duplex signal at a nominal rate of 1600 hops/sec. Bluetooth is Modulated using adaptive
frequency hopping (AFH). This modulation has the capability to reduce Interference.

KCES‟S COEM,JALGAON

The devices themselves are categorized into range ability. There are three classes of devices
each covering a select range. Class 1 devices are mostly used in industrial cases and have a
range of 100 to 300 meters. These devices take more power than the standard devices you
and I are accustomed to in our daily routine and therefore are a bit more expensive. Class 2
devices are most commonly found in mobile devices and the most commonly used. Items.
Such as cell phones and printers are Class 2 devices and have a range of 10 to 30 feet and use
only 2.5 milli-Watts of power. Finally, Class 3 devices have the shortest range of up to 1
meter and include devices such as keyboards and a computer mouse. Class three devices
therefore require the least amount of power and are in general the least.

Bluetooth Piconets : Let‟s say you have a typical modern living room with typical
modern stuff Inside. There‟s an entertainment system with a stereo, a DVD player, a satellite
TV receiver and a television; there‟s also a cordless telephone and a personal computer. Each
of these systems uses Bluetooth, and each forms its own piconet to talk between the main
unit and peripheral. The cordless telephone has one Bluetooth transmitter in the base and
another in the handset. The manufacturer has programmed each unit with an address that
falls into a range of addresses it has established for a particular type of device. When the
base is first turned on, it sends radio signals asking for a response from any units with an
address in a particular range. Since the handset has an address in the range, it responds, and a
tiny network is formed. Now, even if one of these devices should receive a signal from
another system, it will ignore it since it‟s not from within the network. The computer and
entertainment system go through similar routines, establishing networks among addresses in
ranges established by manufacturers. Once the networks are established, the systems begin
talking among themselves. Each piconet hops randomly through the available frequencies, so
all of the piconets are completely separated from one another. Now the living room has three
separate networks established, each one made up of devices that know the address Of
transmitters it should listen to and the address of receivers it should talk to. Since each
network is changing the Frequency of its operation thousands of times a second, it‟s unlikely
that any two networks will be on the same Frequency at the same time. If it turns out that
they are, then the resultinging confusion will only cover a tiny fraction Of a second, and
software designed to correct for such errars weeds out the confusing information and gets on
with The network‟s business.

Bluetooth Architecture :The Bluetooth architecture is divided into two specifications:


the core and the profile specifications. The core Specification discusses how the technology
works while the profile specification focuses on how to build Interoperating devices using
the core technologies.

HOW TO BLUEJACK?
Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make
sure that Bluetooth is enabled. You will need to read the handbook of the particular phone (or
PDA etc) that you have but somewhere in the Menu Item you will find the Item that enables
and disabled Bluetooth.

Now, remember that Bluetooth only works aver short distances, so if you are in the middle of
Dartmoor then BlueJacking isn‟t going to work for you (unless the sheep have mobile phones
these days!) so you need to find a crowd. BlueJacking is very new so not everyone will have a
Bluetooth phone or PDA so the bigger the crowd the more likely you will have of finding a
victim‟. The Tube (yes, Bluetooth works underground), on the train, in a Café or standing in
line are all good places to start.

You will now need to create a new Contact In your Phone Book- however rather than putting
someone‟s name in the Name field you write your short message instead so for example rather
than creating a contact called Alan Philips you would write – “Hey, you have been
Bluelacked!” instead (or whatever message you want to send).

Now select the new contact and from the Menu of the phone choose “Send via Bluetooth”. This
is a facility aval able within the Mobile Phone that was designed to send a Contact to someone
else useful in Business when tra ling names and addresses, however we are now going to use it
to send our message that was contained in the Name leld of the contact clever eh?

Your phone or PDA will start to search the airwaves for other devices that within range. If you
are lucky you will see a list of them appear, or it will say that it cannot find any. If the latter
happens then relocate to another crowd or walt a while and try again. If you have a list of found
devices then let the fun begin. Unfortunately, almost every Bluetooth enabled device will not
yet be configured with a useful name so you are going to have to guess. Some devices will be
called by their Phone manufacturer (e.g. Nokia, Sony) or maybe a random string.
To name our phone. You can build a library of contacts with predefined messages.

Mobile:

The various steps involve in this are as follows:

• First press the 5-way joystick down.  Then choose options.


• Then choose “New contact”
• Then in the first line choose your desired message
• Then press done
• Then go to contact
• Then press options
• Then scroll down to send
• Then choose via Bluetooth o 10.Then the phone will be searching for unable
devices Personal computers/laptops:

• Go to contacts in your Address Book program (e.g. Outlook)


• Create a new contact
• Enter the message into one of the „name‟ fields
• Save the new contact
• Go to the address book
• Right-click on the message/contact
• Go to action
• Go to Send toBluetooth
• Click on other
• Select a device from the list and double click on it.

Software tools

The procedure for bluejacking as stated or explained earlier are very long and confusing. To
avold this we have developed some software to do bluejacking in an easier way. So by
downloading that software on your personal computer or on your Bluetooth configured mobile
phone you can do it directly by just searching the enabled Bluetooth device and send
unsolicited messages to them. There are many software tools available in the market and there
name is according to their use. Some of them are as follows:

Bluespam:

BlueSpam searches for all discoverable Bluetooth devices and sends a file to them (spams
them) if they support OBEX. By default a small text will be send. To customize the message
that should be send you need a palm with an SD/MMC card, then you create the
directory/PALM/programs/BlueSpam/Send/ and put the file (any type of file will work.jpg is
always fun) you would like to send into this directory. Activity is logged to
/PALM/programs/BlueSpam/Log/log.txt. BlueSpam also supports backfire, if you put your
palm into discoverable and connectable mode, BlueSpam will Intercept all connection attempts
by other Bluetooth devices and starts sending a message back to the sender.

Meeting point

Meeting point is the perfect tools to search for Bluetooth devices. You can set your meeting
point to a certain channel and meet up with people you‟ve not met before. Combine it with any
bluejacking tools and have lots of fun.
This software is compatible with pocket PC, palm, Windows.
Freejack:

Freejack is compatible to java phone like Nokia N-series.

Easyjacking (eJack):

Allows sending of text Messages to other Bluetooth enables devices.

USAGE OF BLUEJACKING :

Bluejacking can be used in many fields and for various purposes. The main fields where the
bluejacking is used are as follows:

• Busy shopping centre


• Starbuck
• Train Station
• High Street
• On a train/tube/bus
• Cinema
• Café/restaurant/pub
• Mobile phone shop
• -Electronics shop (e.g. Dixons)

The main use of bluejacking tools or bluejacking is in advertising purpose and location based
purpose. Advertising on mobile devices has large potential due to the very personal and
intimate nature of the devices and high targeting possibilities. We Introduce a novel B-MAD
system for delivering permission-based location-aware mobile. Advertisements to mobile
phones using Bluetooth positioning and Wireless Application Protocol (WAP) Push. We present
a thorough quantitative evaluation of the system in a laboratory environment and qualitative
user evaluation in form of a field trial in the real environment of use. Experimental results
show that the system provides a vi ble solution for realizing permission-based mobile
advertising.

Bluetooth location based system

In terms of location proximity detection for mobile phone users the obvious choice is Bluetooth
which, de oite previous predictions of its demise, is in fact Increasing its growth and Nokla is
predicting a year-on year Increa e of 65% in 2006. There are already a small number of mobile
Bluetooth proximity applications in existence which are often described as mobile social
software (MoSoSo) and can be viewed as evolutions of Bluejacking. Bluejacking was/is a
phenomenon where people exploit the contacts feature on their mobile phone to send messages
to other Bluetooth enabled devices in their proximity. Bluejacking evolved Into dedicated
software applications such as Mobiluck and Nokia Sensor which provided a simpler interface,
and in the case of Nokia Sensor, individual profiles could be used to initiate a social
Introduction. In terms of this particular application it could be regarded as a business orientated
application of the Bluejacking phenomenon. Consumers are becoming increasingly aware of
the use and benefits of Bluetooth as demonstrated in the widespread

Use of Bluetooth dongles through which the users can connect their desktop machines to these
devices

Bluejacking as a market channel :

Bluetooth offers a new communications channel to marketers. But the technology needs to be
respected if they are to avoid alienating consumers according to a white paper from Rainier PR.
Stephen Waddington, managing director of Rainier PR, turns wireless sleuth. The marketing
industry is never slow to jump on a new communication channel and exploit it for its own ends.
The telephone, emall, SMS text messaging and the web have all become a standard part of the
marketing toolkit, the latter having a marked impact on the way in which organizations
communicate with their audiences.

Now there is a new mobile communication platform called Bluetooth and both the marketing
and technology community are debating whether it offers a new opportunity to be exploited for
marketing.

Marketing opportunity :

This mechanism by which messages can be sent between Bluetooth devices predominantly
mobile phones – has provoked discussion within the marketing community as to whether
Bluetooth could be used as a promotional communication initiatives for Bluetooth have been
seen in the automotive and medical industries in that manufactures have begun to include
Bluetooth access in cars and medical monitoring equipment, According to analysts [11],
Bluetooth is currently present in 65% of all mobile phone handsets thus making a system such
as the one described in this paper, a very practical and worthwhile scenario.

This location based system enables Bluetooth to be used as a means of targeting users with
specialized content in a specific area at a given time. For example, users in a supermarket could
be informed about a certain discount offer based upon their purchasing habits. Such messages
can be sent to all the users in the area with a Bluetooth enabled mobile handset or PDA. In
order that the system can service a diverse range of users and devices no client side application
is required thus nothing has to be installed. The information is presented in a very familiar and
simple form of a text message. Figure 3 shows the basic layout of a system for transmitting
messages to all the devices in a given area,

The system uses object exchange protocol (OBEX) over Bluetooth to send the info rmation to
target devices. Licensed by Bluetooth SIG from IrDA, OBEX has become even more popular
than during its original period as means of transferring business details. OBEX is transport
neutral, as With the hypertext transfer protocol (HTTP), which means that it can work over
almost any other transport layer protocol. OBEX is defined as one of the protocols in Bluetooth
and Sits over RS232 serial cable emulation (RFCOMM) protocol. Moreover, OBEX is a
structured protocol which provides the functionality to separate data and data attributes. A clear
definition of each request can be given which helps distinguish one request from another. Use
of other protocols such as RFCOMM or logical link control and adaptation protocol (L2CAP)
require the applications sending and receiving information to know how the data is sent and
when to send the reply.

CODES OF ETHICS:
• The various codes of ethics are as follows:
• Bluejackers will only send messages/pictures. They will never try to
„hack‟ a device for the purpose o
• Copying or modifying any files on any device or upload any executable files. By
hacking a device you are
• Committing an offence under the computer misuse act 1990, which states it is an
offence to obtain
• Inauthorized access to any computer. Changes in this law soon will cover all mobile
devices including  Phones.
• Any such messages or pictures sent will not be of an insulting, libelous or
pornographic nature and wil
• Be copyright free or copyrighted by the sender. Any copyright protected
images/sound files will only be
• Sent with the written consent of the copyright holder.
• if no interest is shown by the recipient after 2 messages the bluejacker will desist and
move on.
• The bluejacker will restrict their activity to 10 messages maximum unless in
exceptional circumstances
• e.g. the continuous exchange of messages between bluejacker & victim where the
victim is willing tO
• participate, the last message being a final comment or parting sentiment (perhaps
nclude
• www.bluejackq.com web address).
• If the Bluejacker senses that he/she is causing distress rather than mirth tQ the
recipient they will
• Immediately deceases all activity towards them.
• If a bluejacker is caught „in the act‟ he/she will be as co- operative as possible and
not hide any details of
• Their activity (honesty is the best policy).
• Social practices of bluejacking
• Other forms of message content included social interaction (19.4%) types of
statements (Figure 3). This
• Suggests that while bluejackers engage in this illicit messaging, they use social
pleasantries to follow the
• Conventions of acceptable small talk occasionally made by strangers in public places.
Bluejackers often
• Wanted to “spread the word” about bluejacking; 16.6% of the messages referred to
the practice of
• Luejacking. They characterized this bluejacking-referential message type as a way to
familiarize recipient
• About bluejacking in the hopes that those who received a bluejack would visit the
Bluejackq website and
• Eventually be inclined to try bluejacking in the future. The evangelical tone adopted
by bluejackers suggests
• That they perceive this practice positively. We were interested in whether bluejackers
engaged in harmful
• KCES‟s CoEM, JALGAON

Behavior through malicious message content, despite their framing of bluejacking as merely
for fun. While bluejackers do not deny that there are pranklike aspects to their activities, there
does seem to be a regulatory spirit among the posters on Bluejackq. As part of the “Guides and
Facts” section of the site, the board moderators have posted a code of ethics, which include
provisions that discourage the sending of executable files, libelous or pornographic pictures,
and excessive messages. This explicit set of rules may explain the relative lack (2.7%) of
malicious message content sent, which we defined as those banned by the Bluejackq code of
ethics. It may, however, also be the case that those who do send malicious messages do not
report them on Bluejackq for fear of censure by the community of posters.

We conceptualized bluejacking as the bluejacker‟s attempt to leave his or her mark on the
recipient‟s mobile phone through violation of possessional territory, which leads us to wonder
if the bluejackers would want to leave an identifiable Imprint, similar to the tag of a graffiti
artist. Only a small percentage of bluejackers (4.7%) sent multimedia files, such as a signature
camera phone image or a theme song, suggesting that for most bluejackers, simply sending a
largely anonymous text-only bluejack was sufficient to mark the recipient‟s mobile phone.
This lack of richer multimedia messages, when combined with the relatively large percentage
of posts (23.4%) that did not indicate message content type, Implies that bluejackers place less
value on a carefully crafted message.

RELATED CONCEPTS :

BLUESNARFING:The “Snarfer” can simulate an internet exchange point by a man-in-


the-middle attack for example and gather Information or data narfing occurred firstly at
Bluetooth devices where the term bluesnarfing is in use. Snarfing cBn Be made difficult
drastically with appropriate security measures at hard- and software Luesnarfing is the
unauthorized access of information from a wireless device through a Bluetooth connection,
ofte Etween phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list,
emails and text message Nd on some phones users can steal pictures and private videos.
Currently available programs must allow connectio And to be „paired to another phone to steal
content. There may be other programs that can break into the phones Without any control, but
if they exist they are not made publicly available by the developer.

Bluecasting:

Though arguably neologism “bluecasting” is grad ually gaining ground as a common term for
the provision of any Small digital media to suitable media provisioning enabled devices over
Bluetooth via the OBEX protocol. Where by small digital media” does not exclusively mean
advertisements but could include photos, podcast style audio Content, vide0, mobile ticketing,
text messages, games (especially those written in J2ME) or even other applications Bluecast is
generally provisioned by a Bluetooth Kiosk a physical server provisioning the digital media
over Bluetoot To interested devices. Bluetooth Kiosks are generally located in public spaces
such as malls, bars or mass-transit Terminals. In India there are some temples which offer
ringtones, wall papers of gods and some other content using bluecasting

Bluebugging gging is a form of Bluetooth attack. In progression of discovery date, Bluetooth


attack started with bluejacki Then bluesnarfing, and then bluebugging. Bluebugging was
discovered by German researcher
Herfurt His Bluebug program allows the user to take control of a Victim‟s phone to call the
user‟s phone. This means that the Bluebug user can simply listen to any conversation his
Victim is having in real life.

FUTURE ASPECTS:

The Bluetooth positioning system needs to be made more reliable. To achieve this, the inquiry
timeout should be Made longer. This would make the positioning latency longer but more
predictable. To shorten the latency the Luetooth Sensor should not wait for the inquiry to time
out before sending the device addresses of found device But send them as soon as they are
liscovered. Guessing user location based on his/ her previous locations could be Another
possibility. Rchitecturally the Ad Server is not cohesive. If mapping device addresses to
location information would be separate From the advertisement sending logic. We plan to do
this as we incorporat Bluetooth positioning to the SmartRotuaari service platform.
Dvertisements should be profiled for each user. Possible profiling factors are gender, age,
language, interests, mood Advertising frequency etc. The system could also learn user
preferences by placing options like “more ads like this‟ And “less ads like this” in each
advertisement. VAP Push is not the only possible advertisement content delivery channel. For
example, the Bluetooth objed Exchange protocol could be used for that purpose, although it
does not give the user the option to download and View the advertisements when he/she sees
fit. However, in a heterogeneous mobile environment, multiple deliveryChannels should be
considered. Also, in a mobile environment it is easier to take advantage of two-way
Communication, which should be thought of as well. The field trial provided evidence
supporting favorable user acceptance. However, a much more extensive and longe

Sting user study would be needed to provide real assessment of the acceptance of mobile
advertisements. Furthe A larger scale deployment would require a thorough validation of the
underlying candidate business models.
CONCLUSION

Bluejacking is technique by which we can interact with hew people and has ability to
revolunerise market by Sending advertisement about the product, enterprise etc. on the
Bluetooth configured mobile phone so that the People get aware about them by seeing them on
the phone. Vow a day it is used in sale promotion or sale tools and in dating. This technique is
used in many fields like cinema Train station, shopping malls ,mobile phone shops etc. now a
days there are new tools available in the markets by Which bluejacking can be done. The basic
technology behind bluejacking is similar Ox 3luetooth because we can do

Bluejacking in the mobile or PADs or computers or laptop configured with


Bluetooth Or Now a days new and new techniques are developing using Bluetooth. Some of
the latest news is: Luetooth Technology Now Standard in Cars , BlueParrott Bluetooth B100
Wireless Headset ,Motorola & Burtor Launch Bluetooth Snowjackets ,Bluetooth shipment
units 3m a week ,0‟Neil Launches „The Hub‟ Bluetooth Snowboard Jacket ,CellStar Launches
Bluetooth Web Surfer ,Emergence of new Bluetooth usage_models ,Heart Onitor Sends Crucial
Information to Cell Phones ,Impulsesoft Delivers Stereo Music Over Bluetooth , TDK Systems

Builds on the benefits of Bluetooth ,Impulsesoft Delivers Stereo Music Over Bluetooth So we
conclude that in future this technology become the key for advertising and to interact with
world and to get The location messages on the phone when you are somewhere out. Bluejacks
are location specific. We first wanted O determine the types of places where bluejacks took
place. The data indicate that bluejacking is an activity that Primarily occurs in public spaces,
outside of the home. Bluejacks frequentloccurred in public transportation

Locales (23.4%), stores and shopping malls (32.1%) and restaurants (9.8%), bars (11.2%) and
cafes (7.3%) but almost Hever at home (0.7%). This suggests that bluejackers are targeting
strangers, presumably taking advantage of Inonymity, opportunities for interaction and
available Bluetooth enabled devices afforded by densely populatec Public spaces.There are few
security issue which can be minimized by taking some simple precaution like .

REFERENCE :
• BluejackQ. http://www.bluejackq.com/ [referenced 4 Nov 2003].
• Clemson H, Coulton P, Edwards R, Chehimi F (2006)
Mobslinger: the fastest mobile in the west. In: 1st world
• Conference for fun „n games, Preston, UK, pp 47-54, 26-28 June 2006 (in press)
• Hehimi F, Coulton P, Edwards R (2006) Mobile advertising: practices,
technologies and future potential. In: The
• Th international conference on mobile business (ICMB 2006), Copenhagen,
Denmark, 26-27 June 2006
• 4.T.Bunker.Serious Flaws in Bluetooth Security Lead to Disclosure of Personal
Data, 2006. http:
• //www.thebunker.net/security/bluetooth.htm.  S Gifford, lan, (January 2, 2007)
“IEEE Approves IEEE 802.15.1 S tandard for Wireless Personal Area Networks
• Adapted from the Bluetooth Specification”, IEEE, Retrieved on
10.02.06 from:
• http://standards.ieee.org/announcements/802151app.html

You might also like