Вы находитесь на странице: 1из 29

P2P Communication using WI-FI Direct and Security Analysis in ANDROID

Abstract

The main purpose of this research project a brief introduction to our application Peer-to-Peer communication using Wi-Fi Direct and Security analysis in ANDROID. The purpose of this research is to design and implement a telephony program that uses Wi-Fi Direct in P2P (Peer-to-Peer) as a means of communication between mobile phones at no cost. Also Cost cutting for consumers for Enterprise by using this application as Emenu System in restaurant.

Introduction

This application is used in a restaurant premises for taking order from the customers by means of using new technology : Android This application provides the complete automation for menu in restaurant as eMenu for different table. By this any restaurant can save the manpower cost.

The Wi-Fi Direct

Wi-Fi Direct is a standard that allows Wi-Fi devices to talk to each other without the need for wireless access points (hot spots). The Wi-Fi Alliance has announced a new way for WiFi-enabled devices to connect to one another, even in the absence of a WiFi base station. The new protocol, dubbed "Wi-Fi Direct," will allow any device that implements the standard to connect directly to another device to send and receive data. A side benefit of Wi-Fi Direct is that it can operate at higher speeds and greater distances than Bluetooth, though Bluetooth typically uses far less power than WiFi. Furthermore, the standard is aimed at enterprise use as well as consumer use, with the inclusion of enterprise management features and WPA2 security.

Wi-Fi Direct

The Wi-Fi Direct protocol uses physical P2P communication in that it allows wi-fi devices in range to talk to each other without the need of intermediate wireless access points or routers.

Peer to Peer

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peerto-peer network of nodes.

Android

Android is a mobile operating system that is based on a modified version of Linux. It was originally developed by a startup of the same name, Android, Inc. In 2005, as part of its strategy to enter the mobile space, Google purchased Android and took over its development work (as well as its development team).

Android(Cont)
The main advantage of adopting Android is that it offers a unified approach to application development. Developers need only develop for Android, and their applications should be able to run on numerous different devices, as long as the devices are powered using Android.

Android Tools

For Android development we can use the Window, MAC or Linux .It can be downloaded free of cost from the different web. Eclipse Android SDK Android Development Tools (ADT ) The Android Development Tools (ADT) plug-in for Eclipse is an extension to the Eclipse IDE that supports the creation and debugging of Android applications.

Android P2P using Wi-Fi direct

1. 2. 3.

The Android SDK provides a set of APIs for retrieving information about the Wi-Fi networks available to the device and Wi-Fi network connection details. Provides classes to create peer-to-peer (P2P) connections with Wi-Fi Direct. Using these APIs, you can discover and connect to other devices when each device supports Wi-Fi Direct, then communicate over a speedy connection across distances much longer than a Bluetooth connection. The primary class we need to work with is WifiP2pManager, which we can acquire by calling getSystemService(WIFI_P2P_SERVICE). The WifiP2pManager includes APIs that allow us to: Initialize the application for P2P connections by calling initialize() Discover nearby devices by calling discoverPeers() Start a P2P connection by calling connect()

Wi-fi direct Android(Cont)


In order to use the Wi-Fi P2P APIs, our app is requested the following user permissions: The CHANGE_WIFI_STATE permission is needed when an application is accessing information about Wi-Fi networks that can turn on the Wi-Fi radio, thus changing its state. The ACCESS_WIFI_STATE permission is needed, as well, to request any information from the Wi-Fi device. INTERNET (although this app doesnt technically connect to the Internet, communicating to Wi-Fi Direct peers with standard java sockets requires Internet permission).

(cont.)

Not all Android-powered devices support Wi-Fi Direct. So this application uses Wi-Fi Direct, declare so with a <uses-feature> element in the manifest file: <manifest ...> <uses-feature android:name="android.hardware.wifi.direct" /> ... </manifest>

Manifest(CONT)

<uses-sdk android:minSdkVersion="14" /> <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" /> <uses-permission android:name="android.permission.CHANGE_WIFI_STATE" /> <uses-permission android:name="android.permission.CHANGE_NETWORK_STATE" /> <uses-permission android:name="android.permission.INTERNET" /> <usespermission android:name="android.permission.ACCESS_NETWORK_STATE" /> <uses-permission android:name="android.permission.READ_PHONE_STATE" /> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE " />

Login

Food Menu

Menu Details

order Submission

Successfully Submission

My Cart Editing

EDITING

Pages after Editing

After submission

Security in Android Attacks


Web-based and network-based attacks. Malware Social engineering attacks. Resource and service availability abuse. Malicious and unintentional data loss. Attacks on the integrity of the devices data.

Android Malware:

Android.Pjapps / Android.Geinimi (January/February, 2010): These threats


were designed to steal information from Android devices and enroll the compromised device in a botnet.

AndroidOS.FakePlayer (August, 2010):

This malicious app masquerades as a media player application. Once installed, it silently sends SMS messages (at a cost of several dollars per message) to premium SMS numbers in Russia.

AndroidOS.FakePlayer

Malware(Cont)

Android.Rootcager (February, 2011):

Also known as Android.DroidDream, this attack was similar in nature to the Android.Pjapps attackthe attacker infected and redistributed more than 58 legitimate applications on Googles App Market.

Android.Bgserv (JAN, 2012):

In response to the Android.Rootcager threat, Google deployed a tool over-the-air to clean up infected Android devices. Shortly after this cleanup tool was released, attackers capitalized on the hype and released a malicious fake version of the cleanup tool.

Android.Bgserv (JAN, 2012):

Conclusion

In this project , i have highlighted how P2P is currently a widespread reality in both wired and wireless networks,and the reasons why a new form of P2P, one that exploits upcoming technologies for fully distributed connections,such as Wi-Fi Direct, can be beneficial for both consumers and service providers. The main objective of this thesis is to present how peer-to-peer based services can be efficiently realized in nextgeneration networks and emerging 3g or 4 technologies by reusing their existing protocols as much as possible, and to present some enhancements to these protocols.Also have analysis of security against Malware in Android.

Thank You

Вам также может понравиться