Proximity Communication Security between a Mobile Application and Accessory
Syed, Maimuna (2016)
Syed, Maimuna
Metropolia Ammattikorkeakoulu
2016
All rights reserved
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-201605249486
https://urn.fi/URN:NBN:fi:amk-201605249486
Tiivistelmä
The report aims to show the security of wireless communication between multimedia A/V accessories such as headsets and speakers and a VoIP mobile application using peer-to-peer communication. The communication protocols emphasized are Bluetooth technologies and Near Field communication. The security of the communication line is a concern nowadays and professionals are still finding a means to make such intrusions more secure.
In this project, first of all the necessary tools and software had to be installed for a compati-ble Windows environment to develop the mobile application, after which the communication between the accessory and application was tested. Next, in order to test the security of the communication, a Linux-based operating system was set up in which a brute attack was carried out on the wireless communication lines using a terminal console.
This study can be implemented in future accessory application or hardware to work on any possible security holes to prevent a possible risk of integrity breach of information. This report may help companies to analyse the threats posed and possibilities that can be par-took for a secure application development.
In this project, first of all the necessary tools and software had to be installed for a compati-ble Windows environment to develop the mobile application, after which the communication between the accessory and application was tested. Next, in order to test the security of the communication, a Linux-based operating system was set up in which a brute attack was carried out on the wireless communication lines using a terminal console.
This study can be implemented in future accessory application or hardware to work on any possible security holes to prevent a possible risk of integrity breach of information. This report may help companies to analyse the threats posed and possibilities that can be par-took for a secure application development.