Vous êtes sur la page 1sur 13

1.

INTRODUCTION
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field i!e! for bluedating or bluechat" to another Bluetooth enabled device via the #B$% protocol! Bluetooth has a very limited range& usually around '( meters on mobile phones, but laptops can reach up to '(( meters with powerful transmitters! Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology! Bluejacking does not involve the removal or alteration of any data from the device! Bluejackers often look for the receiving phone to ping or the user to react! )n order to carry out a bluejacking, the sending and receiving devices must be within '( meters of one another! Phone owners who receive bluejack messages should refuse to add the contacts to their address book! Devices that are set in non-discoverable mode are not susceptible to bluejacking! *he messages tend to be anonymous since the recipient has no idea who has sent the bluejack, and the recipient has no information about the bluejacker, e+cept for the name and model of the bluejacker,s mobile phone! Because of Bluetooth,s short-range networking capabilities, bluejacking can only occur between actors who are within '( meters of each other, which makes this activity highly location-dependent! Contrary to what the name suggests, the bluejack recipient,s phone is not hijacked& that is,

the phone is at no time under the control of the bluejacker! -e conceptuali.e bluejacking as a violation of possessional territory! )nspired by /offman, we propose that the mobile phone is a possessional territory as a result of the intimacy and continued contact between mobile phone users and their phones! A possessional territory, in our usage, is an object that engenders attachment and defense by those who perceive possession and can be referred to as a 0personal effect!1 Possessional territories function 0egocentrically1& that is, they move around with their owners who maintain and e+ert regulatory control, such as the definition of settings! 2ince we characteri.e the mobile phone as a possessional territory, we adapt the category of violation, defined as a temporary incursion where gaining control is not necessarily the goal as a likely and appropriate category of infringement in this conte+t! *o gain a further understanding of why bluejackers would engage in a practice that disrupts the social conventions of public space, we ask the following research 3uestions4 '! -hat are the characteristics of the public spaces in which bluejacking occurs5 6! -hat are the alternative social conventions that might arise from the practice of bluejacking5 7! -hat implications does this appropriation have for the design of mobile social systems5 1.1 Origin *his bluejack phenomenon started after a 8alaysian )* consultant named
1

0Ajack1 posted a comment on a mobile phone forum! Ajack told )* -eb that he used his $ricsson cellphone in a bank to send a message to someone with a 9okia :;<(! Becoming bored while standing in a bank 3ueue, Ajack did a Bluetooth discovery to see if there was another Bluetooth device around! Discovering a 9okia :;<( in the vicinity, he created a new contact and filled in the first name with =Buy $ricsson>? and sent a business card to the 9okia phone! 0A guy a few feet away from me suddenly had his :;<( beep! @e took out his :;<( and started looking at his phone! ) couldn?t contain myself and left the bank,1 he says! Ajack then posted the story on a mobile -eb site and other people started trying it out! 0) gave it the name bluejacking taken from the words Bluetooth and hijacking" and it has just taken off from there!1 @e says bluejacking is common in 8alaysia and is happening everywhere there are lots of Bluetooth devices! Bluejacking has become popular among young people wanting to play practical jokes! A '7-year-old named $llie from 2urrey in the AB has started a dedicated bluejacking site called bluejack3! *he site e+plains what bluejacking is and also has forums where people can share their bluejacking e+periences!

2. BLUEJACKING TECHNOLOGY
As we know that bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field i!e! for bluedating or bluechat" to another Bluetooth enabled device via the #B$% protocol! 2o bluejacking is based on Bluetooth technology which is e+plained bellow! 2.1. Bluetooth te hnolog! Bluetooth *echnology was developed to solve the simple problem of eliminating the connector cable! *he idea is to replace the cables that are needed to accompany portable devices carried by many mobile travelers with a low-cost, secure, robust CD link! #riginally Bluetooth marketed to small handheld devices such as cell phones and laptops! As the Bluetooth standard emerged successfully into society, the world demanded more! )t is reported on Eets /o Digital in an article written by )lse Furrien that three new Bluetooth products are 3ualified every day and '( million Bluetooth units are shipped per week! Bluetooth is so efficient, effective, and secure that even the )$$$ approved the G(6!'<!' 2tandard for -ireless Person Area 9etworks based on the Bluetooth specification! "h#t i$ Bluetooth% Bluetooth is defined as a wireless technology that provides short-range communications intended to replace the cables connecting portable andHor fi+ed devices while maintaining high levels of security! *here are three key features of Bluetooth& robustness, low power, and low
2

cost! *he Bluetooth standard provides a uniform structure enabling a wide variety of devices to seamlessly, and wirelessly, connect and communication with each other! Bluetooth devices connect and communicate via CD link through shortrange piconets! Bluetooth devices have the ability to connect with up to seven devices per piconet! $ach of these devices can also be simultaneously connected to other piconets! *he piconet itself is established dynamically and automatically as Bluetooth enables devices enter and leave the range in which its radio operates! *he major pro of Bluetooth is the ability to be full duple+ and handle both data and voice transmission simultaneously! *he differentiation of Bluetooth from other wireless standards such as -i-fi is that the Bluetooth standard gives both link layer and application layer definitions which support data and voice applications! Bluetooth comes in two core versions& Iersion 6!( J $nhanced Data Cate and Iersion '!6! *he primary differences being Bluetooth 6!( has a data rate of 7 8ega byte per second whereas Iersion '!6 has only a ' 8ega byte per second data rate! Both are e3uipped with e+tended 2ynchronous Connections e2C#", which improves voice 3uality of audio links by allowing retransmissions of corrupted packets! *he devices themselves are categori.ed into range ability! *here are three classes of devices each covering a select range! Class ' devices are mostly used in industrial cases and have a range of '(( to 7(( meters! *hese devices take more power than the standard devices you and ) are accustomed to in our daily routine and therefore are a bit more
3

e+pensive! Class 6 devices are most commonly found in mobile devices and the most commonly used! )tems such as cell phones and printers are Class 6 devices and have a range of '( to 7( feet and use only 6!< milli--atts of power! Dinally, Class 7 devices have the shortest range of up to ' meter and include devices such as keyboards and a computer mouse! Class three devices therefore re3uire the least amount of power and are in general the lease e+pensive! &#'i(u( &#'i(u( R#nge )er(itte* )er(itte* Cl#$$ ,#..ro'i(# )o+er )o+er te,(",*B(Cl#$$ 1 Cl#$$ 2 Cl#$$ / '(( 8w 6!< 8w ' 8w 6( dBm L dBm ( dBm K'((meters K'( meters K' meter

2.1.1 Bluetooth )i onet$ Eet,s say you have a typical modern living room with typical modern stuff inside! *here,s an entertainment system with a stereo, a DID player, a satellite *I receiver and a television& there?s also a cordless telephone and a personal computer! $ach of these systems uses Bluetooth, and each forms its own piconet to talk between the main unit and peripheral! *he cordless telephone has one Bluetooth transmitter in the base and another in the handset! *he manufacturer has programmed each unit with an #**re$$ that falls into a range of addresses it has established for a particular type of device! -hen the base is first turned on, it sends radio signals asking for a response from any units with an address in a

particular range! 2ince the handset has an address in the range, it responds, and a tiny net+or0 is formed! 9ow, even if one of these devices should receive a signal from another system, it will ignore it since it,s not from within the network! *he computer and entertainment system go through similar routines, establishing networks among addresses in ranges established by manufacturers! #nce the networks are established, the systems begin talking among themselves! $ach piconet hops randomly through the available fre3uencies, so all of the piconets are completely separated from one another! 2.1.2 The Bluetooth Ar hite ture *he Bluetooth architecture is divided into two specifications4 the core and the profile specifications! *he core specification discusses how the technology works while the profile specification focuses on how to build interoperating devices using the core technologies!

(dBm" with e+tensions for operating at up to '(( m- 6(dBm" worldwide! *he nominal link range is '( centimeters to '( meters, but can be e+tended to more than '(( meters by increasing the transmit power to '(( m-! The Bluetooth B#$e2#n* *he basic radio is a hybrid spread spectrum radio that operates in a fre3uency hopping manner in the )28 band! As stated earlier, the band is divided into :M one 8egahert. channels that the radio randomly hops through while transmitting and receiving data! A piconet is formed when one Bluetooth radio connects to another Bluetooth radio! Both radios then hope together throughout the :M channels! *he Bluetooth radio system supports a large number of piconets by providing each piconet with its own set of random hoping patterns! 2.2 3C#r* 4ile 4or(#t vCard is a file format standard for electronic business cards! vCards are often attached to e-mail messages, but can be e+changed in other ways, such as on the -orld -ide -eb! *hey can contain name and address information, phone numbers, ACEs, logos, photographs, and even audio clips! *he vCard or 5er$it #r* was originally proposed in 'MM< by the Iersit consortium, which consisted of Apple Computer, A*N* *echnologies later Eucent", )B8 and 2iemens! )n December 'MM; ownership of the format was handed over to the )nternet 8ail Consortium, a trade association for companies with an interest in )nternet e-mail! vCard is accompanied by a proposed standard for e+changing data
4

Digure '4 The R1 L#!er *he Bluetooth air interface is based on a nominal antenna power of 'm-

about forthcoming appointments called vCalendar since superseded by iCalendar& the )nternet 8ail Consortium has issued a statement that it Ohopes that all vCalendar developers take advantage of these new open standards and make their software compatible with both vCalendar '!( and iCalendar!O vCard defines the following property types4 D9, 9, 9)CB9A8$, P@#*#, BDAP, ADC, EAB$E, *$E, $8A)E, 8A)E$C, *Q, /$#, *)*E$, C#E$, E#/#, A/$9*, #C/, CA*$/#C)$2, 9#*$, PC#D)D, C$I, 2#C*-2*C)9/, 2#A9D, ACE, A)D, I$C2)#9, CEA22, and B$P ! vCard supports private e+tensions, with a O%-O prefi+, a number of which are in common usage! 6o(e o4 the$e in lu*e7 E'ten$ion U$e* A$ D#t# 6e(#nti e+tensions supported by multiple different programs arbitrary PPPP- anniversary, %Property 88- in addition A99)I$C2ACP DD to BDAP R birthday assistant name %-A22)2*A9* Property string instead of Agent" manager %-8A9A/$C Property string name %-2P#A2$ Property string spouse name

particular phone or PDA etc" that you have but somewhere in the 8enu item you will find the item that enables and disabled Bluetooth!

9ow, remember that Bluetooth only works over short distances, so if you are in the middle of Dartmoor then BlueFacking isn?t going to work for you unless the sheep have mobile phones these days>" so you need to find a crowd! BlueFacking is very new so not everyone will have a Bluetooth phone or PDA so the bigger the crowd the more likely you will have of finding a ?victim?! *he *ube yes, Bluetooth works underground", on the train, in a Cafe or standing in line are all good places to start! Pou will now need to create a new Contact in your Phone Book - however rather than putting someone,s name in the 9ame field you write your short message instead - so for e+ample rather than creating a contact called Alan Philips you would write - O@ey, you have been BlueFacked>O instead or whatever message you want to send" 9ow select the new contact and from the 8enu of the phone choose O2end via BluetoothO! *his is a facility available within the 8obile Phone that was designed to send a Contact to someone else - useful in Business when trading names and addresses, however we are now going to use it to send our message that was contained in the 9ame field of the contact - clever eh5 Pour phone or PDA will start to search the airwaves for other devices that within range! )f you are lucky you will see a list of them appear, or it will say that it cannot find any! )f the latter happens then relocate to another crowd or wait a while
5

/. HO" TO BLUEJACK
Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled! Pou will need to read the handbook of the

and try again! )f you have a list of found devices then let the fun begin! Anfortunately, almost every Bluetooth enabled device will not yet be configured with a useful name - so you are going to have to guess! 2ome devices will be called by their Phone manufacturer e!g! 9okia, 2ony" or maybe a random string! *ry one at random and look around to see who grabs their phone and then looks perple+ed when they read your message 4" )f you want to name your Phone so it appears as a name in the list on a BlueFackers phone see how to name our phone !Pou can build a library of contacts with predefined messages! /.1 &o2ile *he various steps involve in this are as follows4 '! Dirst press the <-way joystick down! 6! *hen choose options! 7! *hen choose O9ew contactO L! *hen in the first line choose your desired message! <! *hen press done! ;! *hen go to the contact! :! *hen press options! G! *hen scroll down to send! M! *hen choose OIia BluetoothO '(! *hen the phone will be searching for enabled Devices! ''! *hen press O2electO

L! 2ave the new contact <! /o to the address book ;! Cight-click on the messageHcontact :! /o to action G! /o to 2end to Bluetooth M! Click on other '(! 2elect a device from the list and double click on it /./ 6o4t+#re tool$ *he procedure for bluejacking as stated or e+plained earlier are very long and confusing! *o avoid this we have developed some software to do bluejacking in an easier way! 2o by downloading that software on your personal computer or on your Bluetooth configured mobile phone you can do it directly by just searching the enabled Bluetooth device and send unsolicited messages to them! *here are many software tools available in the market and there name is according to their use! 2ome of them are as follows4 /./.1 Blue$.#( Blue2pam searches for all discoverable Bluetooth devices and sends a file to them spams them" if they support #B$%! By default a small te+t will be send! *o customi.e the message that should be send you need a palm with an 2DH88C card, then you create the directory HPAE8HprogramsHBlue2pamH 2endH and put the file any type of file will work !jpg is always fun" you would like to send into this directory!Activity is logged toHPAE8HprogramsHBlue2pamHEogHlog!t+t Blue2pam also supports backfire, if you put your palm into discoverable and connectable mode, Blue2pam will intercept all connection attempts by other Bluetooth devices and starts sending a message back to the sender!
6

/.2 )er$on#l o(.uter$8l#.to.$ '! /o to contacts in your Address Book program e!g! #utlook" 6! Create a new contact 7! $nter the message into one of the ?name? fields

/./.2. &eeting .oint 8eeting point is the perfect tools to search for Bluetooth devices! Pou can set your meeting point to a certain channel and meet up with people you,ve not met before! Combine it with any bluejacking tools and have lots of fun! *his software is compatible with pocket PC, palm, -indows! /././ 1ree9# 0 Dreejack is compatible to java phone like 9okia 9-series! /./.:. E#$!9# 0ing ,eJ# 0Allows sending of te+t 8essages to other Bluetooth enables devices!

-ireless Application Protocol -AP" Push! -e present a thorough 3uantitative evaluation of the system in a laboratory environment and 3ualitative user evaluation in form of a field trial in the real environment of use! $+perimental results show that the system provides a viable solution for reali.ing permissionbased mobile advertising! :.1 Bluetooth lo #tion 2#$e* $!$te( )n terms of location pro+imity detection for mobile phone users the obvious choice is Bluetooth which, despite previous predictions of its demise, is in fact increasing its growth and 9okia is predicting a year-on year increase of ;<T in 6((;! *here are already a small number of mobile Bluetooth pro+imity applications in e+istence which are often described as mobile social software 8o2o2o" and can be viewed as evolutions of Bluejacking! Bluejacking wasHis a phenomenon where people e+ploit the contacts feature on their mobile phone to send messages to other Bluetooth enabled devices in their pro+imity! Bluejacking evolved into dedicated software applications such as 8obiluck and 9okia 2ensor which provided a simpler interface, and in the case of 9okia 2ensor, individual profiles could be used to initiate a social introduction! )n terms of this particular application it could be regarded as a business orientated application of the Bluejacking phenomenon! *his location based system enables Bluetooth to be used as a means of targeting users with speciali.ed content in a specific area at a given time! Dor e+ample, users in a supermarket could be informed about a certain discount offer
7

:. U6AGE O1 BLUEJACKING
Bluejacking can be used in many fields and for various purposes! *he main fields where the bluejacking is used are as follows4 Busy shopping centre 2tarbucks *rain 2tation @igh 2treet #n a trainH tubeH bus Cinema CafSH restaurantH pub 8obile phone shop $lectronics shop e!g! Di+ons" *he main use of bluejacking tools or bluejacking is in advertising purpose and location based purpose! Advertising on mobile devices has large potential due to the very personal and intimate nature of the devices and high targeting possibilities! -e introduce a novel B-8AD system for delivering permission-based locationaware mobile advertisements to mobile phones using Bluetooth positioning and

based upon their purchasing habits! 2uch messages can be sent to all the users in the area with a Bluetooth enabled mobile handset or PDA! )n order that the system can service a diverse range of users and devices no client side application is re3uired thus nothing has to be installed! *he information is presented in a very familiar and simple form of a te+t message! Digure 7 shows the basic layout of a system for transmitting messages to all the devices in a given area!

PC! 2tephen -addington, managing director of Cainier PC, turns wireless sleuth. *he marketing industry is never slow to jump on a new communication channel and e+ploit it for its own ends! *he telephone, email, 282 te+t messaging and the web have all become a standard part of the marketing toolkit, the latter having a marked impact on the way in which organi.ations communicate with their audiences! 9ow there is a new mobile communication platform called Bluetooth and both the marketing and technology community are debating whether it offers a new opportunity to be e+ploited for marketing gain! :./ &#r0eting o..ortunit! *his mechanism by which messages can be sent between Bluetooth devices - predominantly mobile phones has provoked discussion within the marketing community as to whether Bluetooth could be used as a promotional communication channel! Bluejacking offers three distinct opportunities for marketers4 1. 5ir#l o((uni #tion $+ploiting communication between consumers to share content such as te+t, images and )nternet references in the same way that brands such as Budweiser, @onda, *rojan Condoms and even Fohn -est 2almon, have created multimedia content that has very 3uickly been circulated around the )nternet 2. Co((unit! # ti3itie$ Dating or gaming events could be facilitated using Bluetooth as a channel to communicate between participants! *he
8

Clie nt

Client

B* message push server

Clien t

1igure/. Basic Bluetooth message system

:.2 Blue9# 0ing #$ # (#r0et h#nnel Bluetooth offers a new communications channel to marketers! But the technology needs to be respected if they are to avoid alienating consumers according to a white paper from Cainier

Clie nt

Clie nt

Cli ent

anonymous nature of bluejacking makes is a superb physiological tool for communication between individuals in a locali.ed environment such as a cafS or pub /. Lo #tion 2#$e* $er3i e$ Bluejacking could be used to send electronic coupons or promotional messages to consumers as they pass a high street shop or supermarket! *o date 282 te+t messaging has been used with mi+ed success as a mechanism to send consumer,s location based information Cainier PC believes that viral communication and to a lesser e+tent event based activities offer the greatest opportunity for bluejacking as a marketing mechanism! Already companies are looking at ways of e+ploiting the technology in these two areas! Eondon, AB-based *ag*e+t has made available a series of urban avatars available free for consumers to send each other! *he company is tight lipped about its ultimate product and goals but has done a superb job of raising its profile by making available a series of free media properties! -hat is clear is that *ag*e+t wants consumers to send *ag*e+t characters to each other and raise the profile of the company! @erein lies one of the key benefits of Bluetooth! Anlike any other mobile communication mechanism it is absolutely free U there are no subscription charges and no costs associated with sending a message! 0*he rise in te+t-based bluejacking couldn,t have been more timely for *ag*e+t,s launch! 9ot only can we capitali.e on the trend, but using images
9

adds a new dimension that even most bluejackers haven,t yet considered,1 said Cussell Buckley, director and founder of *ag*e+t! Buckley admits that Bluejacking would not suit everyone, but for brands that want bleeding edge youth credibility, it,s certainly worth considering! 0)f you don,t shy away from other forms of guerrilla marketing like fly posting or giant image projection, you may want to think about this new medium,1 he said!

;. CODE O1 ETHIC6
a" *he ?bluejacker? is the individual carrying out the bluejack! b" *he ?victim? is the individual receiving the bluejack! *he various codes of ethics are as follows4 '! Bluejackers will only send messagesHpictures! *hey will never try to ?hack? a device for the purpose of copying or modifying any files on any device or upload any e+ecutable files! By hacking a device you are committing an offence under the computer misuse act 'MM(, which states it is an offence to obtain unauthori.ed access to any computer! Changes in this law soon will cover all mobile devices including phones! 6! Any such messages or pictures sent will not be of an insulting, libelous or pornographic nature and will be copyright free or copyrighted by the sender! Any copyright protected imagesHsound files will only be sent with the written consent of the copyright holder!

7! )f no interest is shown by the recipient after 6 messages the bluejacker will desist and move on! L! *he bluejacker will restrict their activity to '( messages ma+imum unless in e+ceptional circumstances e!g! the continuous e+change of messages between bluejacker N victim where the victim is willing to participate, the last message being a final comment or parting sentiment perhaps include www!bluejack3!com web address"! <! )f the Bluejacker senses that heHshe is causing distress rather than mirth to the recipient they will immediately deceases all activity towards them! ;! )f a bluejacker is caught ?in the act? heHshe will be as co-operative as possible and not hide any details of their activity honesty is the best policy"! :! 2ocial practices of bluejacking #ther forms of message content included social interaction 'M!LT" types of statements Digure 7"! *his suggests that while bluejackers engage in this illicit messaging, they use social pleasantries to follow the conventions of acceptable small talk occasionally made by strangers in public places! Bluejackers often wanted to 0spread the word1 about bluejacking& ';!;T of the messages referred to the practice of bluejacking! *hey characteri.ed this bluejacking-referential message type as a way to familiari.e recipients about bluejacking in the hopes that those who received a bluejack would visit the Bluejack3 website and eventually be inclined to try bluejacking in the future! *he evangelical tone adopted by bluejackers suggests that they perceive this practice positively! -e were interested in
10

whether bluejackers engaged in harmful behavior through malicious message content, despite their framing of bluejacking as merely for fun! -hile bluejackers do not deny that there are prank-like aspects to their activities, there does seem to be a regulatory spirit among the posters on Bluejack3! -e conceptuali.ed bluejacking as the bluejacker,s attempt to leave his or her mark on the recipient,s mobile phone through violation of possessional territory, which leads us to wonder if the bluejackers would want to leave an identifiable imprint, similar to the tag of a graffiti artist! #nly a small percentage of bluejackers L!:T" sent multimedia files, such as a signature camera phone image or a theme song, suggesting that for most bluejackers, simply sending a largely anonymous te+t-only bluejack was sufficient to mark the recipient,s mobile phone! *his lack of richer multimedia messages, when combined with the relatively large percentage of posts 67!LT" that did not indicate message content type, implies that bluejackers place less value on a carefully crafted message! *he act itself and the description of the location in which the bluejack took place are the noteworthy portions of the practice when bluejackers share their stories of bluejacking!

<. RELATED CONCE)T6


*he various concepts related to bluejacking are as follows4

<.1 Blue$n#r4ing 2narfing is information theft or data manipulation in wireless, local networks V -EA9"! *he word snarf probably is a portmanteau from snort and scarf and derived as a rather malicious form of sniffing! )t is also an e+tremely likely that the term was coined from cartoon characters in American popculture! *he O2narferO can simulate an internet e+change point by a man-in-themiddle attack for e+ample and gather information or data! 2narfing occurred firstly at Bluetooth devices where the term bluesnarfing is in use! 2narfing can be made difficult drastically with appropriate security measures at hard- and software! Bluesnarfing is the unauthori.ed access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs! *his allows access to a calendar, contact list, emails and te+t messages and on some phones users can steal pictures and private videos! Bluesnarfing is much more serious in relation to Bluejacking, but both e+ploit others? Bluetooth connections without their knowledge! Any device with its Bluetooth connection turned on and set to OdiscoverableO able to be found by other Bluetooth devices in range" may be susceptible to Bluejacking, and possibly to Bluesnarfing when and if Bluesnarfing of the current Bluetooth security becomes possible! By turning off this feature, the potential victim can be safer from the possibility of being Bluesnarfed& although a device that is set to OhiddenO may be Bluesnarfable by guessing the device?s 8AC address via brute force!
11

<.2 Blue #$ting Although arguably neologism O2lue #$tingO is gradually gaining ground as a common term for the provision of any small digital media to suitable media provisioning enabled devices over Bluetooth via the #B$% protocol! -here by Osmall digital mediaO does not e+clusively mean advertisements but could include photos, podcast style audio content, video, mobile ticketing, te+t messages, games especially those written in F68$" or even other applications! <./ Blue2ugging Bluebugging is a form of Bluetooth attack! )n progression of discovery date, Bluetooth attack started with bluejacking, then bluesnarfing, and then bluebugging! Bluebugging was discovered by /erman researcher @erfurt! @is Bluebug program allows the user to take control of a victim?s phone to call the user?s phone! *his means that the Bluebug user can simply listen to any conversation his victim is having in real life!

=. 6ECURITY I66UE
As we know that bluejacking is elated to Bluetooth therefore all the security issue related to Bluetooth are also related to bluejacking! )n Bluetooth, security modes there are three

6e urit! &o*e 17 )n this mode, the device does not implement any security procedures, and allows any other device to initiate connections with it 6e urit! &o*e 27 )n mode 6, security is enforced after the link is

established, allowing higher level applications to run more fle+ible security policies! 6e urit! &o*e /7 )n mode 7, security controls such as authentication and encryption are implemented at the Baseband level before the connection is established! )n this mode, Bluetooth allows different security levels to be defined for devices and services!

Concerns about bluejacking were raised earlier this month when security firm AE Digital published a report that suggested there are a number of security problems with Bluetooth devices! OBluejacking promotes an environment that puts consumer devices at greater risk because of serious flaws in the authentication andHor data transfer mechanisms on some Bluetooth-enabled devices,1 it said! =.1 Counter$>&e#$ure$ Bnowing of potential problems of jacking and denial of service attacks of Bluetooth is the first step! Bnowing that these things can occur may help a user think twice in when and where it is best to use their device! )t will also make them insure that information they do not wish to use over the air is insured to get to the potential receiver! *he best solution is to turn off your Bluetooth device until you need to communicate with another user! 2ince we know that software can turn on and off Bluetooth a device, disabling it and leaving it on is not your best bet!

*he Bluetooth positioning system needs to be made more reliable! *o achieve this, the in3uiry timeout should be made longer! *his would make the positioning latency longer but more predictable! *o shorten the latency the Bluetooth 2ensor should not wait for the in3uiry to time out before sending the device addresses of found devices but send them as soon as they are discovered! /uessing user location based on hisHher previous locations could be another possibility! -AP Push is not the only possible advertisement content delivery channel! Dor e+ample, the Bluetooth object e+change protocol could be used for that purpose, although it does not give the user the option to download and view the advertisements when heHshe sees fit! @owever, in a heterogeneous mobile environment, multiple delivery channels should be considered! Also, in a mobile environment it is easier to take advantage of two-way communication, which should be thought of as well! *he field trial provided evidence supporting favorable user acceptance! @owever, a much more e+tensive and longer lasting user study would be needed to provide real assessment of the acceptance of mobile advertisements! Durther, a larger scale deployment would re3uire a thorough validation of the underlying candidate
business models!

@. CONCLU6ION
Bluejacking is techni3ue by which we can interact with new people and has ability to revolunerise market by sending advertisement about the product, enterprise etc! on the Bluetooth configured mobile
12

?. 1UTURE A6)ECT6

phone so that the people get aware about them by seeing them on the phone! 9ow a day it is used in sale promotion or sale tools and in dating! *his techni3ue is used in many fields like cinema , train station, shopping malls ,mobile phone shops etc! now a days there are new tools available in the markets by which bluejacking can be done! *he basic technology behind bluejacking is similar to Bluetooth because we can do bluejacking in the mobile or PADs or computers or laptop configured with Bluetooth! 9ow a day new and new techni3ues are developing using Bluetooth! 2o we conclude that in future this technology become the key for advertising and to interact with world and to get the location messages on the phone when you are somewhere out! Bluejacks are location specific! -e first wanted to determine the types of places where bluejacks took place! *he data indicate that bluejacking is an activity that primarily occurs in public spaces, outside of the home! Bluejacks fre3uently occurred in public transportation locales 67!LT", stores and shopping malls 76!'T" and restaurants M!GT", bars ''!6T" and cafes :!7T" but almost never at home (!:T"! *his suggests that bluejackers are targeting strangers, presumably taking advantage of anonymity, opportunities for interaction and available Bluetooth enabled devices afforded by densely populated public spaces!*here are few security issue which can be minimi.ed by taking some simple precaution like when you do not want to be blue jacked just off your Bluetooth!

'! BluejackW! http4HHwww!bluejack3!comH Xreferenced L 9ov 6((7Y! 6! Clemson @, Coulton P, $dwards C, Chehimi D 6((;" 8obslinger4 the fastest mobile in the west! )n4 'st world conference for fun =n games, Preston, AB, pp L:U<L, 6;U6G Fune 6((; in press" 7! Chehimi D, Coulton P, $dwards C 6((;" 8obile advertising4 practices, technologies and future potential! )n4 *he <th international conference on mobile business )C8B 6((;", Copenhagen, Denmark, 6;U6: Fune 6((; L! *! Bunker! 2erious Dlaws in Bluetooth 2ecurity Eead to Disclosure of Personal Data, 6((;! http4 HHwww!thebunker!netHsecurityHbluetoot h!htm! <! /ifford, )an, Fanuary 6, 6((:" 0)$$$ Approves )$$$ G(6!'<!' 2tandard for -ireless Personal Area 9etworks Adapted from the BluetoothZ 2pecification1, IEEE, Cetrieved on '(!(6!(; from4 http4HHstandards!ieee!orgHannouncement sHG(6'<'app!html ;! Eegg, /reg, August L, 6((<" 0*he Bluejacking, Bluesnarfing, Bluebugging Blues4 Bluetooth Daces Perception of Iulneability1, TechOnLine, Cetrieved on '(!('!(; from4 www!techonline!com!HcommunityHtech [topicHbluetoothH7GL;:

1A. RE1ERENCE6

13