and Initial Research
Ratika Bali
Department of Computer Science and Engineering
Guru Tegh Bahadur Institute of Technology
New Delhi, India
Abstract—The mobile phone technology has developed
tremendously in the past forty years since its invention in 1973
owing to its unique, wiring sans and fixation free networked
system. Mobile phones have been espoused as an everyday
technology, omnipresent at every physical location. Initially used
merely as a communicative device to facilitate a channel for
mediated conversation, the usage of mobile phones has been
diversified progressively. One such appropriation is bluejacking,
the technique of relaying anonymous, unwanted and unsolicited
short messages via vCard functionality over Bluetooth to
Bluetooth-enabled devices using the OBEX (OBject EXchange)
protocol. This paper provides an overview of the Bluejacking
Technology.
Keywords— Bluejacking, Bluejackaddict, Bluetooth Exchange,
OBEX, vCard.
Bluejacking is an attack conducted on Bluetoothcompatible devices, such as smart phones, laptops and PDAs.
Bluejacking is instigated by an attacker (termed as bluejacker
or bluejackaddict) who forwards unsolicited messages to a
user of Bluetooth-enabled device. When the connection goes
through, the bluejacker tries to send a message to the recipient.
The actual message sent to the user’s device does not cause
detriment, but is used to inveigle the user to counter react in
some manner or add the new contact to the device’s address
book. [1] This message-transmitting attack resembles spam
and phishing attacks conducted against email users.
Bluejacking can be perceived as either infuriating or amusing,
though it is relatively risk-free since the recipient has the
option to decline. Bluejacking sure makes for an interesting
wake-up call in close-knit