A WTLS Handshake Protocol against Active Attack
نویسندگان
چکیده
WTLS as a secure protocol of WAP makes TLS that is used in wireless Internet protocol for TCP security is appropriate to wireless environments [1][2]. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of four protocols, such as Handshake, ChangeCipherSpec, Alert, Application Data. In this paper we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attack models with them for a basis. Also we propose a new Handshake protocol that is secure against several active attack models and can provide various security services. Key-Words: WTLS, handshake protocol, active attack, elliptic curve cryptosystem
منابع مشابه
A WTLS Handshake Protocol with User Anonymity and Forward Secrecy
Forward secrecy and user anonymity are provided in the WTLS for the wireless Internet communications. Forward secrecy can be built by using Diffie-Hellman key agreement with random numbers in the Hello messages, and user anonymity by employing the signcryption scheme to the ClientKeyExchange and CertificateVerify procedure. In addition to these features, the modified WTLS handshake protocol has...
متن کاملA Survey Paper on Wireless Transport Layer Security
WAP is the protocol that is a secure data communication for the wireless environments developed by the WAP Forum. WTLS(Wireless Transport Layer Security) is the proposed protocol for secure communication in the WAP. The purpose of WTLS is to provide secure and efficient services in the wireless Internet environment. However, the existing WTLS handshake protocol has some security problems in sev...
متن کاملPerformance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handshake between mobile client and WAP gateway (server). Several cryptosystems at different key strengths can be used in WTLS. The trade-off is security versus processing and transmission time. In this paper, an analytical ...
متن کاملA Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices
Energy efficiency has been an important factor in protocol design in wireless networks where small handheld wireless devices rely solely on battery power. Security is also of great concern in wireless networks. Several security protocols adapted from wired networks have been used in wireless networks to provide identity authentication. Security protocols could contribute significantly to energy...
متن کاملAttacks against the WAP WTLS protocol
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years. Even though the WTLS protocol is closely modeled after the wellstudied TLS protocol, we have identified a number of potential security problems in i...
متن کامل