A Security Tunnel for Conducting Mobile Business over the Tcp Protocol
نویسندگان
چکیده
This paper discusses security issues in the Mobile Business area with emphasis on the significance of mobile commerce and provides a framework to address and analyse common security problems of mBusiness services and applications. We propose a new model to address efficiently some security problems in mobile environments, which rescinds Gateway/Proxy intermediates and establishes a secure end-to-end communication between mobile users and service providers over the TCP protocol. In this context, an application prototype is developed in J2ME, which implements and demonstrates the proposed model.
منابع مشابه
Performance Study of TULIP Protocol over 802.11 Wireless Networks
The TCP performance degrades over the wireless networks due to non congestion related problems but performs well in case of wired networks. The current network scenarios consist of combined wired and wireless links which demands for investigating the performance in such heterogeneous scenarios. The non congestion losses on the wireless link are interpreted by TCP as congestion losses and eventu...
متن کاملThe AltaVista Tunnel Using the Internet to Extend Corporate Networks
Vol. 9 No. 2 1997 5 The public Internet is fast becoming a ubiquitous and inexpensive medium for connecting remote employees or offices to a private intranet or for permitting impromptu high-speed connections between business partners. This gain in connectivity is offset by a significant loss in security, however. The Internet is notorious for electronic break-ins and eavesdropping. The AltaVis...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملA cross-layer scheme for resource reservation based on multi-protocol label switching over mobile IP version6
The last decades have brought tremendous improvement in wireless internet and its technologies. This has inspired the development of a variety of new services in business and consumer markets. The real time applications such as voice over internet protocol (VOIP) and other multimedia traffic such as Internet Protocol television have driven the demand for increasing and guaranteed bandwidth requ...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003