Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce

نویسندگان

  • Paul Ashley
  • Heather M. Hinton
  • Mark Vandenwauver
چکیده

The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) e-commerce environment are also available for wireless transactions. In this paper we will show that these perceptions are misplaced. We describe the security properties and mechanisms available for Internet (wired), WAP based and iMode e-commerce. We find that both WAP and iMode provide excellent security features and are geared to provide other security provisions over and above those commonly available in a wired environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure M-Commerce with WPKI

The huge success of mobile telephone is about to transform ebusiness and the Internet. As a Personal Trusted Device PTD, the mobile phone, will be able to handle secure transactions in a wireless world. The Wireless Application Protocol (WAP) suite enables secure e-commerce services and applications. This paper present an overview of the PKI and the WAP environments and their relation to the In...

متن کامل

WAP may Stumble over the Gateway (Security in WAP-based Mobile Commerce)

The key design idea underlying the Wireless Application Protocol (WAP) is to use a gateway at the intersection of the wireless mobile network and the traditional, wired network. The WAP gateway forwards web content to the mobile phone in a way intended to accommodate the limited bandwidth of the mobile network and the mobile phone’s limited processing capability. However, the gateway introduces...

متن کامل

Facing the Challenge of Wireless Security

I ncreasingly, companies and individuals are using wireless technology for important communications they want to keep private, such as mobile e-commerce transactions, e-mail, and corporate data transmissions. At the same time, as wireless platforms mature, grow in popularity, and store valuable information, hackers are stepping up their attacks on these new targets. This is a particular problem...

متن کامل

WAP may Stumble over the Gateway

The key design idea underlying the Wireless Application Protocol (WAP) is to use a gateway at the intersection of the wireless mobile network and the traditional, wired network. The WAP gateway forwards web content to the mobile phone in a way intended to accommodate the limited bandwidth of the mobile network and the mobile phone’s limited processing capability. However, the gateway introduces...

متن کامل

The Security Hole in WAP: An Analysis of the Network and Business Rationales Underlying a Failure

To succeed commercially, the Wireless Application Protocol (WAP), a protocol for the delivery of Internet-like services for mobile phones, had to dominate the market for mobile electronic commerce, but a security hole made it unsuitable for e-commerce transactions. The security hole was a byproduct of the so-called WAP-gateway. Mobile service providers offering WAP to their subscribers were sup...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001