A Review on Wireless Transport Layer Security
نویسنده
چکیده
Wireless Application Protocol (WAP) is one of the technical standards for information over a mobile wireless network. Mobile devices such as mobile phones that use the protocol have a WAP browser as a web browser. WTLS (wireless transport layer security) inherited from TLS (Transport Layer Security). WTLS uses similar semantics adapted for a low bandwidth mobile device. As compared to TLS main changes are compressed data structures where possible packet sizes are reduced by using bit-fields, discarding redundancy and truncating some cryptographic elements. WTLS defines a compressed certificate format. This broadly follows the X.509 v3 certificate structure, but uses smaller data structures. Packet based design TLS is designed for use over a data stream. WTLS adapts that design to be more appropriate on a packet based network. WTLS design is based on a requirement that it be possible to use a packet network such as SMS as a data transport. There are number of WTLS security issues. WTLS processing more is fast as compared to using SSL. So it is suitable for wireless system. WTLS uses modern cryptography tools to enhance security. WTLS can provide different level of security for privacy, data integrity and authentications Keywords— WTLS, WAP, WCMP, WAE, SSL.
منابع مشابه
A Survey of Security Mechanisms for Wireless Networks
In wireless networks, providing information security (including confidentiality, authenticity and integrity of data) has been an issue with the recent discovery of security holes in the Wired Equivalent Privacy (WEP) model for wireless network security. Variations in standard techniques for implementation of cryptographic functions, key agreement, and even transport protocols can help improve p...
متن کاملA Transport and Application-layer Approach to Seamless Service Continuity across Heterogeneous Wireless Networks
The integration of 802.11-based WLANs and GPRS/UMTS cellular networks has attracted considerable research interest during the last few years. Several topics need to be addressed, including authentication, security, QoS support, and mobility management. In the ITEA Easy Wireless project, we are focussing on ensuring transparent connectivity and seamless service continuity as users are transition...
متن کاملFormal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملComprehensive Review on Wireless Sensor Networks
Wireless Sensor Networks (WSNs) consists of low power, low-cost smart devices which have limited computing resources. A lot of real world applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial mach...
متن کامل