A Security Tunnel for Conducting Mobile Business over the Tcp Protocol

نویسندگان

  • C. Leonidou
  • A. S. Andreou
  • A. Sofokleous
  • C. Chrysostomou
  • S. Mavromoustakos
  • A. Pitsillides
  • G. Samaras
  • C. Schizas
چکیده

This paper discusses security issues in the Mobile Business area with emphasis on the significance of mobile commerce and provides a framework to address and analyse common security problems of mBusiness services and applications. We propose a new model to address efficiently some security problems in mobile environments, which rescinds Gateway/Proxy intermediates and establishes a secure end-to-end communication between mobile users and service providers over the TCP protocol. In this context, an application prototype is developed in J2ME, which implements and demonstrates the proposed model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Study of TULIP Protocol over 802.11 Wireless Networks

The TCP performance degrades over the wireless networks due to non congestion related problems but performs well in case of wired networks. The current network scenarios consist of combined wired and wireless links which demands for investigating the performance in such heterogeneous scenarios. The non congestion losses on the wireless link are interpreted by TCP as congestion losses and eventu...

متن کامل

The AltaVista Tunnel Using the Internet to Extend Corporate Networks

Vol. 9 No. 2 1997 5 The public Internet is fast becoming a ubiquitous and inexpensive medium for connecting remote employees or offices to a private intranet or for permitting impromptu high-speed connections between business partners. This gain in connectivity is offset by a significant loss in security, however. The Internet is notorious for electronic break-ins and eavesdropping. The AltaVis...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

A cross-layer scheme for resource reservation based on multi-protocol label switching over mobile IP version6

The last decades have brought tremendous improvement in wireless internet and its technologies. This has inspired the development of a variety of new services in business and consumer markets. The real time applications such as voice over internet protocol (VOIP) and other multimedia traffic such as Internet Protocol television have driven the demand for increasing and guaranteed bandwidth requ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003