Secure M-Commerce with WPKI
نویسندگان
چکیده
The huge success of mobile telephone is about to transform ebusiness and the Internet. As a Personal Trusted Device PTD, the mobile phone, will be able to handle secure transactions in a wireless world. The Wireless Application Protocol (WAP) suite enables secure e-commerce services and applications. This paper present an overview of the PKI and the WAP environments and their relation to the Internet, the security standards specified for WAP and how WPKI standards and technologies have been adapted to ensure security for M-Commerce requirements. This paper also addresses some shortcomings of WAP and shows how these problems may be overcome, recent developments and changes, as well as future impacts of this new development for operators, manufacturers and users.
منابع مشابه
Wireless PKI and Distributed IDS for Securing Intranets and M-Commerce
Recent R/D advances are presented in this keynote address on wireless and security technologies. To access Internet from mobile devices, the existing public key infrastructure (PKI) must be modified to work with limited wireless network bandwidth and low computing and memory capacity of handheld devices. A complete security chain is needed from smart cards to mobile clients, wireless PKI (WPKI)...
متن کاملWireless Public key Infrastructure for Mobile Phones
Mobile devices play an important role in the wireless network environment for providing different services over internet. The business transactions over wireless electronic devices are not secure and hence the messages are prone to be intercepted and modified by an intruder. So, devices supporting wireless internet must be guaranteed at the same level of security as the wired network. PKI (Publ...
متن کاملDesign and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone...
متن کاملSecure Wireless Payment Protocol
With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols are necessary for online transactions. A good payment protocol should balance the requirements of security and convenience. WAP (Wireless Application Protocol) is one of the prevalent wireless technologies being embraced by the b...
متن کاملNew Novel Approaches for Securing VoIP Applications
SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless environments, the efficiency of security service is one of the important matters in question. For the such ef...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001