spy android apps

5
International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 2, February 2015, ISSN 2348 8050 33 www.ijete.org SPY ANDROID APP Mahesh Gavhane*, Sachin More**, Ganesh Ghodke***, Prof.Mr. Patil S.S.****, Prof.Mr. Nimbalkar P.P***** *Al-Ameen College of engineering, Koregaon Bhima, Savitribai Phule Pune Universit, Pune. **Al-Ameen College of engineering, Koregaon Bhima, Savitribai Phule Pune Universit, Pune. ***Al-Ameen College of engineering, Koregaon Bhima, Savitribai Phule Pune Universit, Pune. ****Al-Ameen, Department of Computer Engineering Koregaon Bhima, Savitribai Phule Pune Universit, Pune. ABSTRACT Employee monitoring system using android mobile is, essentially, software that allows Managers to monitor their Employee's office cell phone. All incoming and outgoing calls, texts and multimedia messages can be seen and interrupted by the Managers, who can also monitor where their Employee are (through GPS), access a history of where they've been and set up alerts if their Employee are going outside of approved geographical zones This system uses Android based mobile phones for the software to be run. The mobile device in the hand of the Employee should be an Android based device and the Managers may have any kind mobile devices, since they are going to receive alerts from the Employee in SMS format only. For convenience, the alerts are also stored in the centralized server like the details of incoming call, text and multimedia messages and the timely location update of their Employee. Managers may later login into the centralized server and view the details of their Employee‟s mobile usage. By using this system, we can avoid the unnecessary things happened for the Employee those who are having mobile phones by monitoring their mobile phone usage and also by tracking their current location through the GPS. Keywords: GPS, Employeetracking, Android phone I. INTRODUCTION Android is an open mobile platform developed by the Open Handset Alliance (OHA) led by Google, Inc. The Android platform consists of several layers: the Linux kernel, native libraries, the Dalvik virtual machine (VM), and an application framework. The Linux kernel provides basic operating system services and hardware abstraction for the upper software stacks. Native libraries support the miscellaneous functionalities of web browsing, multimedia data processing, database access, and GPS reception optimized for a resource-limited hardware environment. The register-based Dalvik VM runs Java code with low memory demand. At the top of the layers, Android provides a component-based programming framework so that users can easily build their own applications. An Android application is written with new and reusable application building blocks, such as activity; broadcast intent receiver, service, and content provider. After an application is written, it is deployed in a Zip compatible archive, .apk file, or the Android package file. An Android package file contains codes, resources, and a special XML file called the Android Manifest file. The manifest file contains basic information about an application such as the package name, component descriptions, and permission declarations. Employee Tracking System using network technology is supported by Organization. Employee tracking adopts a mobile cell phone network. Based on the experiences and findings of the field experiments, we propose a new generation Employee tracking system. The Collected tracking information in this system contains the position and time information of android mobile terminals. When the employee crosses particular boundary area an immediate alert message will be sent to the manager‟s mobile phone. With this system it is possible for the manager in organization to track the location of the employee. Android is a software stack for mobile devices that includes an operating system, middleware and key applications. The android SDK provides the tools and APIs necessary to begin developing applications on the Android platform using the Java programming language. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. The kernel also acts as an abstraction layer between the hardware and the rest of the software stack. Every Android application runs in its own process, with its own instance of the Dalvik Virtual machine. Dalvik has been written so that a device can run multiple VMs efficiently. The Dalvik VM executes files in the Dalvik Executable (.dex) format which is optimized for minimal memory footprint. The VM is register-based, and runs classes compiled by a Java language complier that have transformed into the .dex format by the included “dx” tool. The Dalvik VM relies on the Linux

Upload: ijeteeditor

Post on 01-Feb-2016

6 views

Category:

Documents


0 download

DESCRIPTION

Employee monitoring system using android mobile is, essentially, software that allows Managers to monitor their Employee's office cell phone. All incoming and outgoing calls, texts and multimedia messages can be seen and interrupted by the Managers, who can also monitor where their Employee are (through GPS), access a history of where they've been and set up alerts if their Employee are going outside of approved geographical zones This system uses Android based mobile phones for the software to be run. The mobile device in the hand of the Employee should be an Android based device and the Managers may have any kind mobile devices, since they are going to receive alerts from the Employee in SMS format only. For convenience, the alerts are also stored in the centralized server like the details of incoming call, text and multimedia messages and the timely location update of their Employee. Managers may later login into the centralized server and view the details of their Employee’s mobile usage. By using this system, we can avoid the unnecessary things happened for the Employee those who are having mobile phones by monitoring their mobile phone usage and also by tracking their current location through the GPS.

TRANSCRIPT

Page 1: SPY ANDROID APPs

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 2, February 2015, ISSN 2348 – 8050

33 www.ijete.org

SPY ANDROID APP

Mahesh Gavhane*, Sachin More**, Ganesh Ghodke***, Prof.Mr. Patil S.S.****, Prof.Mr. Nimbalkar P.P*****

*Al-Ameen College of engineering, Koregaon Bhima, Savitribai Phule Pune Universit, Pune.

**Al-Ameen College of engineering, Koregaon Bhima, Savitribai Phule Pune Universit, Pune.

***Al-Ameen College of engineering, Koregaon Bhima, Savitribai Phule Pune Universit, Pune.

****Al-Ameen, Department of Computer Engineering Koregaon Bhima, Savitribai Phule Pune Universit, Pune.

ABSTRACT Employee monitoring system using android

mobile is, essentially, software that allows Managers

to monitor their Employee's office cell phone. All

incoming and outgoing calls, texts and multimedia

messages can be seen and interrupted by the Managers,

who can also monitor where their Employee are

(through GPS), access a history of where they've been

and set up alerts if their Employee are going outside of

approved geographical zones This system uses

Android based mobile phones for the software to be

run. The mobile device in the hand of the Employee

should be an Android based device and the Managers

may have any kind mobile devices, since they are

going to receive alerts from the Employee in SMS

format only. For convenience, the alerts are also stored

in the centralized server like the details of incoming

call, text and multimedia messages and the timely

location update of their Employee. Managers may later

login into the centralized server and view the details of

their Employee‟s mobile usage. By using this system,

we can avoid the unnecessary things happened for the

Employee those who are having mobile phones by

monitoring their mobile phone usage and also by

tracking their current location through the GPS.

Keywords: GPS, Employeetracking, Android phone

I. INTRODUCTION Android is an open mobile platform developed

by the Open Handset Alliance (OHA) led by Google,

Inc. The Android platform consists of several layers:

the Linux kernel, native libraries, the Dalvik virtual

machine (VM), and an application framework. The

Linux kernel provides basic operating system services

and hardware abstraction for the upper software stacks.

Native libraries support the miscellaneous

functionalities of web browsing, multimedia data

processing, database access, and GPS reception

optimized for a resource-limited hardware

environment. The register-based Dalvik VM runs Java

code with low memory demand. At the top of the

layers, Android provides a component-based

programming framework so that users can easily build

their own applications. An Android application is

written with new and reusable application building

blocks, such as activity; broadcast intent receiver,

service, and content provider.

After an application is written, it is deployed

in a Zip compatible archive, .apk file, or the Android

package file. An Android package file contains codes,

resources, and a special XML file called the Android

Manifest file. The manifest file contains basic

information about an application such as the package

name, component descriptions, and permission

declarations.

Employee Tracking System using network

technology is supported by Organization. Employee

tracking adopts a mobile cell phone network. Based on

the experiences and findings of the field experiments,

we propose a new generation Employee tracking

system.

The Collected tracking information in this

system contains the position and time information of

android mobile terminals. When the employee crosses

particular boundary area an immediate alert message

will be sent to the manager‟s mobile phone. With this

system it is possible for the manager in organization to

track the location of the employee. Android is a

software stack for mobile devices that includes an

operating system, middleware and key applications.

The android SDK provides the tools and APIs

necessary to begin developing applications on the

Android platform using the Java programming

language.

Android relies on Linux version 2.6 for core

system services such as security, memory

management, process management, network stack, and

driver model. The kernel also acts as an abstraction

layer between the hardware and the rest of the software

stack. Every Android application runs in its own

process, with its own instance of the Dalvik Virtual

machine. Dalvik has been written so that a device can

run multiple VMs efficiently.

The Dalvik VM executes files in the Dalvik

Executable (.dex) format which is optimized for

minimal memory footprint. The VM is register-based,

and runs classes compiled by a Java language complier

that have transformed into the .dex format by the

included “dx” tool. The Dalvik VM relies on the Linux

Page 2: SPY ANDROID APPs

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 2, February 2015, ISSN 2348 – 8050

34 www.ijete.org

kernel for underlying functionality such as threading

and low-level memory management.

Android uses SQLite which is a powerful and

lightweight relational database engine available to all

applications. There are various features available in the

android and those mainly focuses on application

framework enabling reuse and replacement of

components, Dalvik virtual machine optimized for

mobile devices. Integrated browser based on the open

source Web Kit engine. Optimized graphics powered

by a custom 2D graphics library; 3D graphics based on

the OpenGL ES 1.0 specification (hardware

acceleration optional).

SQL it for structured data storage Media

support for common audio, video, and still image

formats. GSM Telephony (hardware dependent).

Bluetooth, EDGE, 3G, and Wi-Fi.

II. EXISTING SYSTEM In the existing system the tracking is done by

fixing tags in different location for identifying the

exactposition of an employee. The android terminal is

connected to Bluetooth and wireless LAN.Tracking is

made to shorter distance while using Bluetooth. The

tracking system is not secure when compared to the

proposed system. The communication link to the

management server is managed by wireless LAN

which is relatively slow when compared to the 3G

network. The dynamic paring of mobile terminal is

mandatory. The network is more complex and it is not

reliable. The message is transferred through wireless

LAN and it is not secure.

Drawbacks of existing system:-

The Managers cannot trace out the

Employee‟s activities in the mobile, like SMS and

Calls.The Managers cannot know the Employee‟s

current location. There is a possibility of data loss

during the message transfer from one mobile terminal

to another mobile terminal. There is a lag in data

transfer due to 2G network.

III. PROPOSED SYSTEM

We have implemented some functions for the

new generation employee tracking system such as

telephony manager to track all incoming, outgoing

calls and Sms. Android mobile terminal is connected

to high speed 3G network for effective data transfer

between two mobile terminals. Tracking can be made

at a very high speed without any distortion in the

network. The tracking system is very secure when

compared to the existing system with the effective

implementation of web service security (WSS).

This proposed system makes use of the cloud

technology to store and retrieve various telephony

information using SOAP protocol. Global Positioning

System, shortly known as GPS System, is the system

that enables you to know the location of a person or a

thing. It consists of minuscule chip which is attached

to the object to be tracked. This chip will give out

signals which are tracked by the satellite which sends

data to the earth giving the exact location of the object.

GPS tracking has come to be accepted on a global

scale. It has got a number of uses worldwide.

Block Diagram:-

Employee

mobile

Manager

mobile

Manager

mobile

Employee

mobile

My sql

DB

Page 3: SPY ANDROID APPs

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 2, February 2015, ISSN 2348 – 8050

35 www.ijete.org

IV. SECURITYANALYSIS Recall that we are using Android as an

illustrative example. We begin by describing several

attack vectors possible on that platform. Later in the

course of the paper, we demonstrate how our security

architecture addresses these security problems. First,

we briefly explain the basic Android security concepts.

ANDROID SECURITY:-

Android is a Linux platform for mobile phones

with a Java middleware on top of the OS. This way,

Android applications are usually Java-based, although

native code can also be accessed through the Native

Development Kit (NDK). Android has two basic parts

of security enforcement. First, applications run as

Linux users and thus are separated from each other.

This way, a security hole in one application does not

affect other applications. However, there is also a

concept of inter-process communication (IPC) between

different applications, or more precisely, between the

Android components of the applications such as

activities and services. The Java-based Android

middleware implements a reference monitor to

mediate access to application components based upon

permission labels defined for the component to be

accessed. Any application requires an appropriate

permission label before it can access a component

(mostly, but not necessarily, of another application). A

number of features further refine Android‟s security

model. One example is the concept of shared user IDs,

i.e., different applications can share the same user ID if

they are signed by the same developer certificate.

Another refinement are protected APIs: Several

security-critical system resources can be accessed

directly rather than using components. WS-Security

(Web Services Security, short WSS) is a flexible and

feature-rich extension to SOAP to apply security to

web services. It is a member of the WS-* family of

web service specifications and was published by

OASIS. The protocol specifies how integrity and

confidentiality can be enforced on messages and

allows the communication of various security token

formats, such as SAML, Kerberos, and X.509. Its main

focus is the use of XML Signature and XML

Encryption to provide end-to-end security. SOAP,

originally defined as Simple Object Access Protocol, is

a protocol specification for exchanging structured

information in the implementation of Web Services in

computer networks. It relies on Extensible Markup

Language (XML) for its message format, and usually

relies on other Application Layer protocols, most

notably Hypertext Transfer Protocol (HTTP) and

Simple Mail Transfer Protocol (SMTP), for message

negotiation and transmission. SOAP can form the

foundation layer of a web services protocol stack,

providing a basic messaging framework upon

whichweb services can be built.

V. METHOD OF IMPLEMENTATION Hardware and Software:

The Android mobile terminal is Google Dev

Phone 1and 2. The operating system for the terminal is

Android2.1 (Eclair). We develop mobile ad hoc

network software using Java programming language

and SDK for Android 2.1.

Functions:

So far, we have implemented communication

software to construct a 3G network by GPS for the

employee tracking system. We took care of security in

communication between each pair of mobile terminals

using WS-Security. When a mobile terminal

communicates with another mobile terminal, it is

necessary to establish pairing of such two mobile

terminals before their communication occurs. When

the employee mobile terminal crosses a particular

boundary region an immediate alert message send to

the manager mobile phone using 3G network and

simultaneously messages stored in the centralized

server. Data stored are secured using encryption

algorithm.

VI. ALGORITHM Encryption Algorithm:-

The system mainly focuses on protecting the

data from eavesdroppers who could infer some

generalized information about the employee without

their knowledge. It is possible to implement the

fundamental objectives of information security, such

as confidentiality, integrity, authentication, and

anonymity typically using this encryption algorithm.

Encryption is the process of converting a plaintext

message into cipher text which can be decoded back

into the original message. An encryption algorithm

along with a key is used in the encryption and

decryption of data. There are several types of data

encryptions which form the basis of network security.

Encryption schemes are based on block or stream

ciphers.

AES Algorithm for Encryption. :- AES is a symmetric block cipher with a block

size of 128 bits. Key lengths can be 128 bits, 192 bits,

or 256 bits;called AES-128, AES-192, and AES-256,

respectively. AES-128 uses 10 rounds, AES-192 uses

12 rounds, and AES-256 uses 14 rounds. The main

loop of AESperforms the following functions:

• SubBytes()

• ShiftRows()

• MixColumns()

• AddRoundKey()

Page 4: SPY ANDROID APPs

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 2, February 2015, ISSN 2348 – 8050

36 www.ijete.org

A simpler way to view the AES function order is:

1. Scramble each byte (SubBytes).

2. Scramble each row (ShiftRows).

3. Scramble each column (MixColumns).

4. Encrypt (AddRoundKey).

A term associated with AES is “the State,” an

„intermediate cipher,‟11 or the ciphertext before the

final round has been applied. AES formats plaintext

into 16 byte (128-bit) blocks, and treats each block as a

4x4 State array. It then performs four operations in

each round. The arrays contains row and column

information used in the operations, especially

MixColumns() and Shiftrows().

SubBytes()adds confusion by processing each byte

through an S-Box. An S-Box is a substitution table,

where one byte is substituted for another, based on a

substitution algorithm.

ShiftRows() provides diffusion by mixing data within

rows. Row zero of the State is not shifted, row 1 is

shifted 1 byte, row 2 is shifted 2 bytes, and row 3 is

shifted 3 bytes, as shown in the FIPS illustration that

follows:

MixColumns()also provides diffusion by mixing data

within columns. The 4 bytes of each column in the

State are treated as a 4-byte number and transformed to

another 4- byte number via finite field mathematics, as

shown in the FIPS illustration that follows:

The actual „encryption‟ is performed in the

AddRoundKey () function, when each byte in the State

is XORed with the subkey. The subkey is derived from

the key according to a key expansion schedule, as

shown in the FIPS illustration that follows:

Here is one round of AES encryption, shown in the

FIPS publication two dimensionally:

VII. CONCLUSION In this paper, we have implemented the new

generation employee monitoring system and system

features to meet the requirements. Using this system it

is possible for the manager to track an employee in the

organization and it is also possible for the manager to

know all the incoming calls, outgoing calls and text

messages sent by an unknown person to the employee.

Using telephony manager technique, the proposed new

generation employee tracking system can adapt to

various mobility of employee by adjusting network.

REFERENCE 1. R. Anand, G. Arun Kumar, S. Murthy “Mitter

– Bitter Monitoring System Using Android

Smartphone‟s” IEEE transaction on

knowledge and data engineering, vol. 12,

May-June 2012

2. Atsushi Ito, Yoshiaki Kakuda, Tomoyuki Ohta

and Shinji Inoue, “New safety support system

for children on school routes using mobile ad

Page 5: SPY ANDROID APPs

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 2 Issue 2, February 2015, ISSN 2348 – 8050

37 www.ijete.org

hoc networks,” IEICE Transactions on

Communications, vol.E94-B, no.1, 2011, to

appear.

3. Yagi, Vivek; Pandya, A.S.; Agarwal, Ankur;

Alhalabi, Bassem “Validation of Object

Recognition Framework on Android Mobile

Platform” High-Assurance Systems

Engineering (HASE), 2011 IEEE 13th

International Symposium pages: 313 – 316,

Nov. 2011

4. Kuntze, Rieke, Diederich, Sethmann, Sohr,

Mustafa, Detken “Secure Mobile Business

Information Processing “2010 IEEE/IFIP 8th

International Conference on, 11-13 Dec. 2010

5. Heming Pang, Linying Jiang, Liu Yang, Kun

Yue, “Research of android smart phone

surveillance system “Computer Design and

Applications (ICCDA), 2010 International

Conference on” 25-27 June 2010V2-373 - V2-

376

6. Hyun Jung La; Soo Dong Kim “A service-

based approach to developing Android Mobile

Internet Device (MID) applications” Service-

Oriented Computing and Applications

(SOCA), 2009 IEEE International Conference

February 2010