CFP last date
20 May 2024
Reseach Article

Conceptualizing Common Security Protocol for Wireless Client and Wired Server

by Kamini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 5
Year of Publication: 2012
Authors: Kamini
10.5120/5689-7735

Kamini . Conceptualizing Common Security Protocol for Wireless Client and Wired Server. International Journal of Computer Applications. 42, 5 ( March 2012), 14-18. DOI=10.5120/5689-7735

@article{ 10.5120/5689-7735,
author = { Kamini },
title = { Conceptualizing Common Security Protocol for Wireless Client and Wired Server },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 5 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number5/5689-7735/ },
doi = { 10.5120/5689-7735 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:37.731404+05:30
%A Kamini
%T Conceptualizing Common Security Protocol for Wireless Client and Wired Server
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 5
%P 14-18
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

When mobile device want to connect to the internet all the communication goes through the WAP gateway. The WAP gateway act as an intermediate between the wireless client and www server. The WAP gateways translate the protocols between the wireless client and wired server. Two protocols are used in between the WAP client and www server. One protocol provides the security between the WAP client and gateway by using the wireless transport layer security. Other protocols provide the security between the WAP gateway and www server by using the transport layer security. The problem is related to providing the end to end security between the WAP client and www server. The focus of this paper is to analyze the security problem and also provide possible solution for the end to end security by designing a CSP (common security protocol) for wireless client and wired server).

References
  1. Dave Singel´ee, Bart Preneel. The Wireless Application Protocol (WAP). COSIC Internal Report, September 2003, Pages 1-5
  2. Mohamad Hairol Jabbar, Mohd Abd Wahab, Nor Aisah Sudin, Ariffin Abdul Mutalib (2009). Accessing Academice Related Materials through WAP protocols", IJWA, Volume 1 Number 3.
  3. WAP introduction. Website link http://www. psit. in/psit/deepesh/wap. pdf.
  4. Fawad Nazir, Aruna Seneviratne. Towards mobility enabled protocol stack for future wireless networks" Ubiquitous Computing and communication journal", Volume 2 Number4 ,pp. 68-69 .
  5. Saurabh Singh, Dr. harsh Kumar verma (2011) . Security for wireless sensor network", IJCSE, pp. 2395-2396, volume 3 No 6.
  6. Sami Jormalainen, Jouni Laine. Security in the WTLS. Computer Science and Engineering Helsinki University of Technology.
  7. Danielyan, Edgar. 2008. WAP: Broken Promise or Wrong Expectations? CISCO. The Internet Protocol Journal. Volume 6 Number 2. Accessed from http://www. cisco. com/web/about/ac123/ac147/archived_issues/ipj_6-2/wap. html.
  8. Complete WAP Security from Certicom pages 5-12.
  9. Andres Liana, Jr (2001). Wireless Application Protocol (WAP) and Mobile Wireless Access", Auerbach Publication", CRC press LLC.
  10. Burak bayoglu, "performance evaluation of wtls handshake protocol using rsa and elliptic curve cryptosystems by burak bayoglu"2004.
  11. Kuljeet Kaur. Article: Fortification of Transport Layer Security Protocol. IJCA Special Issue on Network Security and Cryptography NSC (2):11-14, December 2011. Published by Foundation of Computer Science, New York, USA.
  12. Ilpo Koskinen, Petteri Repo, Petteri Repo (2006)," WAP and Accountability: Shortcomings of the Mobile Internet as an Interactional Problem", Vol. 2, Issue 1, November, pp. 22-38.
  13. Niels Christian Juul and Niels Jørgensen (2003). The Security Hole in WAP: An Analysis of the Network and Business Rationales Underlying a Failure", Vol 7, pp. 73-92.
  14. Sandra Kay Miller (2001). facing the challenge of wireless security". Technology news. July. pp-16.
  15. "WTLS – The Security layer in the WAP Stack. Colloquium on Information Security Martin Christinat, Markus Isler, keyon.
Index Terms

Computer Science
Information Sciences

Keywords

Wap Security Client Server Communication