neshat application
TRANSCRIPT
-
8/2/2019 Neshat Application
1/29
P2P Communicationusing WI-FI Direct and
Security Analysis inANDROID
-
8/2/2019 Neshat Application
2/29
Abstract
The main purpose of this research project a briefintroduction to our application Peer-to-Peercommunication using Wi-Fi Direct and Securityanalysis in ANDROID. The purpose of this research is
to design and implement a telephony program that usesWi-Fi Direct in P2P (Peer-to-Peer) as a means ofcommunication between mobile phones at no cost. AlsoCost cutting for consumers for Enterprise by using this
application as Emenu System in restaurant.
-
8/2/2019 Neshat Application
3/29
Introduction
This application is used in a restaurantpremises for taking order from the customers bymeans of using new technology : Android
This application provides the complete
automation for menu in restaurant as eMenufor different table.
By this any restaurant can save the manpowercost.
-
8/2/2019 Neshat Application
4/29
The Wi-Fi Direct
Wi-Fi Direct is a standard that allows Wi-Fi devices to talk toeach other without the need for wireless access points (hotspots).
The Wi-Fi Alliance has announced a new way for WiFi-enableddevices to connect to one another, even in the absence of a WiFi
base station. The new protocol, dubbed "Wi-Fi Direct," will allowany device that implements the standard to connect directly toanother device to send and receive data.
A side benefit of Wi-Fi Direct is that it can operate at higherspeeds and greater distances than Bluetooth, though Bluetoothtypically uses far less power than WiFi. Furthermore, the standardis aimed at enterprise use as well as consumer use, with theinclusion of enterprise management features and WPA2 security.
http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Wi-Fi -
8/2/2019 Neshat Application
5/29
Wi-Fi Direct
The Wi-Fi Direct protocol uses physical P2Pcommunication in that it allows wi-fi devices inrange to talk to each other without the need of
intermediate wireless access points or routers.
-
8/2/2019 Neshat Application
6/29
-
8/2/2019 Neshat Application
7/29
Android
Android is a mobile operating system thatis based on a modified version of Linux. Itwas originally developed by a startup of
the same name, Android, Inc. In 2005, aspart of its strategy to enter the mobilespace, Google purchased Android and
took over its development work (as well asits development team).
-
8/2/2019 Neshat Application
8/29
Android(Cont)
The main advantage of adopting Android isthat it offers a unified approach toapplication development. Developers need
only develop for Android, and theirapplications should be able to run onnumerous different devices, as long as the
devices are powered using Android.
-
8/2/2019 Neshat Application
9/29
Android Tools
For Android development we can use the Window, MACor Linux .It can be downloaded free of cost from thedifferent web.
Eclipse
Android SDK Android Development Tools (ADT )
The Android Development Tools (ADT) plug-in forEclipse is an extension to the Eclipse IDE that supports
the creation and debugging of Android applications.
-
8/2/2019 Neshat Application
10/29
Android P2P using Wi-Fi direct
The Android SDK provides a set of APIs for retrieving informationabout the Wi-Fi networks available to the device and Wi-Fi networkconnection details.
Provides classes to create peer-to-peer (P2P) connections with Wi-Fi
Direct. Using these APIs, you can discover and connect to otherdevices when each device supports Wi-Fi Direct, then communicateover a speedy connection across distances much longer than aBluetooth connection.
The primary class we need to work with is WifiP2pManager, which wecan acquire by calling getSystemService(WIFI_P2P_SERVICE).The WifiP2pManager includes APIs that allow us to:
1. Initialize the application for P2P connections by calling initialize()
2. Discover nearby devices by calling discoverPeers()
3. Start a P2P connection by calling connect()
http://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/app/Activity.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/app/Activity.htmlhttp://developer.android.com/reference/android/app/Activity.htmlhttp://developer.android.com/reference/android/app/Activity.htmlhttp://developer.android.com/reference/android/app/Activity.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.htmlhttp://developer.android.com/reference/android/net/wifi/p2p/WifiP2pManager.html -
8/2/2019 Neshat Application
11/29
Wi-fi direct Android(Cont)
In order to use the Wi-Fi P2P APIs, our app is requestedthe following user permissions:
The CHANGE_WIFI_STATE permission is needed whenan application is accessing information about Wi-Finetworks that can turn on the Wi-Fi radio, thus changingits state.
The ACCESS_WIFI_STATE permission is needed, as well,to request any information from the Wi-Fi device.
INTERNET(although this app doesnt technically connectto the Internet, communicating to Wi-Fi Direct peers withstandard java sockets requires Internet permission).
http://developer.android.com/reference/android/Manifest.permission.htmlhttp://developer.android.com/reference/android/Manifest.permission.html -
8/2/2019 Neshat Application
12/29
(cont.)
Not all Android-powered devices support Wi-FiDirect. So this application uses Wi-Fi Direct,declare so with a element in the
manifest file:
...
http://developer.android.com/guide/topics/manifest/uses-feature-element.htmlhttp://developer.android.com/guide/topics/manifest/uses-feature-element.htmlhttp://developer.android.com/guide/topics/manifest/uses-feature-element.htmlhttp://developer.android.com/guide/topics/manifest/uses-feature-element.html -
8/2/2019 Neshat Application
13/29
Manifest(CONT)
-
8/2/2019 Neshat Application
14/29
Login
-
8/2/2019 Neshat Application
15/29
Food Menu
-
8/2/2019 Neshat Application
16/29
Menu Details
-
8/2/2019 Neshat Application
17/29
order Submission
-
8/2/2019 Neshat Application
18/29
Successfully Submission
-
8/2/2019 Neshat Application
19/29
My Cart Editing
-
8/2/2019 Neshat Application
20/29
EDITING
-
8/2/2019 Neshat Application
21/29
Pages after Editing
-
8/2/2019 Neshat Application
22/29
After submission
S i i A d id
-
8/2/2019 Neshat Application
23/29
Security in AndroidAttacks
Web-based and network-based attacks.
Malware
Social engineering attacks. Resource and service availability abuse.
Malicious and unintentional data loss.
Attacks on the integrity of the devicesdata.
-
8/2/2019 Neshat Application
24/29
Android Malware:
Android.Pjapps / Android.Geinimi(January/February, 2010): These threatswere designed to steal information from Android
devices and enroll the compromised device in abotnet.
AndroidOS.FakePlayer (August, 2010):
This malicious app masquerades as a mediaplayer application. Once installed, it silentlysends SMS messages (at a cost of severaldollars per message) to premium SMS numbers
in Russia.
-
8/2/2019 Neshat Application
25/29
AndroidOS.FakePlayer
-
8/2/2019 Neshat Application
26/29
Malware(Cont)
Android.Rootcager (February, 2011):Also known as Android.DroidDream, this attack was similar
in nature to the Android.Pjapps attackthe attacker
infected and redistributed more than 58 legitimateapplications on Googles App Market.
Android.Bgserv (JAN, 2012):In response to the Android.Rootcager threat, Google
deployed a tool over-the-air to clean up infected Androiddevices. Shortly after this cleanup tool was released,attackers capitalized on the hype and released amalicious fake version of the cleanup tool.
-
8/2/2019 Neshat Application
27/29
Android.Bgserv (JAN, 2012):
-
8/2/2019 Neshat Application
28/29
Conclusion
In this project , i have highlighted how P2P is currently awidespread reality in both wired and wirelessnetworks,and the reasons why a new form of P2P, onethat exploits upcoming technologies for fully distributed
connections,such as Wi-Fi Direct, can be beneficial forboth consumers and service providers. The mainobjective of this thesis is to present how peer-to-peerbased services can be efficiently realized in next-
generation networks and emerging 3g or 4 technologiesby reusing their existing protocols as much as possible,and to present some enhancements to theseprotocols.Also have analysis of security against Malwarein Android.
-
8/2/2019 Neshat Application
29/29
Thank You