Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Seminar Report On BLUE JACKING
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Seminar Report On BLUE JACKING


[attachment=47957]

INTRODUCTION

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.
Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

Origin

This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a mobile phone forum. Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia 7650.
Becoming bored while standing in a bank queue, Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity, he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the Nokia phone.
“A guy a few feet away from me suddenly had his 7650 beep. He took out his 7650 and started looking at his phone. I couldn't contain myself and left the bank,” he says.
Ajack then posted the story on a mobile Web site and other people started trying it out.
“I gave it the name bluejacking (taken from the words Bluetooth and hijacking) and it has just taken off from there.”
He says bluejacking is common in Malaysia and is happening everywhere there are lots of Bluetooth devices.
Bluejacking has become popular among young people wanting to play practical jokes. A 13-year-old named Ellie from Surrey in the UK has started a dedicated bluejacking site called bluejackq. The site explains what bluejacking is and also has forums where people can share their bluejacking experiences.

BLUEJACKING TECHNOLOGY

As we know that bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. So bluejacking is based on Bluetooth technology which is explained bellow.

Bluetooth technology

Bluetooth Technology was developed to solve the simple problem of eliminating the connector cable. The idea is to replace the cables that are needed to accompany portable devices carried by many mobile travelers with a low-cost, secure, robust RF link. Originally Bluetooth marketed to small handheld devices such as cell phones and laptops. As the Bluetooth standard emerged successfully into society, the world demanded more. It is reported on Lets Go Digital in an article written by Ilse Jurrien that three new Bluetooth products are qualified every day and 10 million Bluetooth units are shipped per week. Bluetooth is so efficient, effective, and secure that even the IEEE approved the 802.15.1 Standard for Wireless Person Area Networks based on the Bluetooth specification.

What is Bluetooth?

Bluetooth is defined as a wireless technology that provides short-range communications intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. There are three key features of Bluetooth; robustness, low power, and low cost. The Bluetooth standard provides a uniform structure enabling a wide variety of devices to seamlessly, and wirelessly, connect and communication with each other. Bluetooth devices connect and communicate via RF link through short-range piconets. Bluetooth devices have the ability to connect with up to seven devices per piconet. Each of these devices can also be simultaneously connected to other piconets. The piconet itself is established dynamically and automatically as Bluetooth enables devices enter and leave the range in which its radio operates. The major pro of Bluetooth is the ability to be full duplex and handle both data and voice transmission simultaneously. The differentiation of Bluetooth from other wireless standards such as Wi-fi is that the Bluetooth standard gives both link layer and application layer definitions which support data and voice applications.
Bluetooth comes in two core versions; Version 2.0 + Enhanced Data Rate and Version 1.2. The primary differences being Bluetooth 2.0 has a data rate of 3 Mega byte per second whereas Version 1.2 has only a 1 Mega byte per second data rate. Both are equipped with extended Synchronous Connections (eSCO), which improves voice quality of audio links by allowing retransmissions of corrupted packets.

Bluetooth Piconets

Let’s say you have a typical modern living room with typical modern stuff inside. There’s an entertainment system with a stereo, a DVD player, a satellite TV receiver and a television; there's also a cordless telephone and a personal computer. Each of these systems uses Bluetooth, and each forms its own piconet to talk between the main unit and peripheral.
The cordless telephone has one Bluetooth transmitter in the base and another in the handset. The manufacturer has programmed each unit with an address that falls into a range of addresses it has established for a particular type of device. When the base is first turned on, it sends radio signals asking for a response from any units with an address in a particular range. Since the handset has an address in the range, it responds, and a tiny network is formed. Now, even if one of these devices should receive a signal from another system, it will ignore it since it’s not from within the network. The computer and entertainment system go through similar routines, establishing networks among addresses in ranges established by manufacturers. Once the networks are established, the systems begin talking among themselves. Each piconet hops randomly through the available frequencies, so all of the piconets are completely separated from one another.

The Bluetooth Baseband

The basic radio is a hybrid spread spectrum radio that operates in a frequency hopping manner in the ISM band. As stated earlier, the band is divided into 79 one Megahertz channels that the radio randomly hops through while transmitting and receiving data. A piconet is formed when one Bluetooth radio connects to another Bluetooth radio. Both radios then hope together throughout the 79 channels. The Bluetooth radio system supports a large number of piconets by providing each piconet with its own set of random hoping patterns.
The Bluetooth frame consists of a transmit packet followed by a receive packet. Each packet can be composed of multiple slots (1, 3, or 5) of 625 us. Below is a single slot frame
Multi-slot frames allow higher data rates because of the elimination of the turn-around time between packets and the reduction in header overhead. The method which Bluetooth radios connect to each other in a piconet is fairly simple. IT is called a master/slave design. The master radio can be connected up to seven slave radios at any given time. Any Bluetooth radio can become a master or a slave radio. At the time of formation the piconet configuration is determined. Usually, the connecting radio will become the master, although, most devices have a “master/slave swap” function that allows the roles to be reversed.

HOW TO BLUEJACK

Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure that Bluetooth is enabled. You will need to read the handbook of the particular phone (or PDA etc) that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth.
Now, remember that Bluetooth only works over short distances, so if you are in the middle of Dartmoor then BlueJacking isn't going to work for you (unless the sheep have mobile phones these days!) so you need to find a crowd. BlueJacking is very new so not everyone will have a Bluetooth phone or PDA so the bigger the crowd the more likely you will have of finding a 'victim'. The Tube (yes, Bluetooth works underground), on the train, in a Cafe or standing in line are all good places to start.
You will now need to create a new Contact in your Phone Book - however rather than putting someone’s name in the Name field you write your short message instead - so for example rather than creating a contact called Alan Philips you would write - "Hey, you have been BlueJacked!" instead (or whatever message you want to send)
Now select the new contact and from the Menu of the phone choose "Send via Bluetooth". This is a facility available within the Mobile Phone that was designed to send a Contact to someone else - useful in Business when trading names and addresses, however we are now going to use it to send our message that was contained in the Name field of the contact - clever eh?
Your phone or PDA will start to search the airwaves for other devices that within range. If you are lucky you will see a list of them appear, or it will say that it cannot find any. If the latter happens then relocate to another crowd or wait a while and try again. If you have a list of found devices then let the fun begin.
Unfortunately, almost every Bluetooth enabled device will not yet be configured with a useful name - so you are going to have to guess. Some devices will be called by their Phone manufacturer (e.g. Nokia, Sony) or maybe a random string. Try one at random and look around to see who grabs their phone and then looks perplexed when they read your message Smile If you want to name your Phone so it appears as a name in the list on a BlueJackers phone see how to name our phone .You can build a library of contacts with predefined messages.