Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Key Resolution of Reencryption by Providing Paging in Between the Gateway

Print
PDF
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 4
Year of Publication: 2012
Authors:
Kamini
Rajiv Mahajan
Prateek Sharma

Kamini, Rajiv Mahajan and Prateek Sharma. Article: Key Resolution of Reencryption by Providing Paging in Between the Gateway. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(4):1-5, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Kamini and Rajiv Mahajan and Prateek Sharma},
	title = {Article: Key Resolution of Reencryption by Providing Paging in Between the Gateway},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {4},
	pages = {1-5},
	month = {November},
	note = {Full text available}
}

Abstract

The Internet use in mobile has increased day by day . Every user want to access the Internet through mobile phones instead of laptop because of its feature like small in size and portable. When mobile user wants to access the Internet on mobile then all the request goes to the wireless gateway . The gateway acts as intermediate between the two points either it can be from wireless to wired or vice versa. The request of mobile phone is transferred from WAP device to web server through the gateway . The gateway is also a protocol translator which translate all the protocols used by wireless device to wired network. The problem of existing system was hole in the gateway . This paper has discussed about the problem of the WAP gateway . This paper focused on implementation of hashing technique in between the networking gateway to provide a solution of Re-encryption.

References

  • Available in the link "http://www. lovelysms. com/mobile-phone-wap-technology. htm"
  • Philip J Mikal,"An introduction to WAP security at the network protocol layer-WTLS" ,Nov 1,2001
  • Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae,"Integrated Transport Layer Security :End to End security model between WTLS and TLS", Kaywon School of Art and Design, Youngdong University, Ewha Womans University
  • Thanh V. Do," WAP Security:WTLS" . INFT 931,May 4,2001 Professor Kris Gaj,Secure Telecommunication System.
  • Albert Levi, Erkay Savas," Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol" Sabanci University,Istanbul, Turkey.
  • Eduardo B. Fernandez, Imad Jawhar, Maria M. Larrondo-Petrie, and Michael VanHilst," An overview of the security of wireless networks" Dept. of Computer Science and Engineering,Florida Atlantic University
  • Thanh V. Do," Project Specification for Analyzing of theWireless Transport Layer Security(WTLS) Applications". March 15, 2001, INFT 931
  • PHILIP J MIKAL"An Introduction to WAP Security at the Network Protocol Layer — WTLS"2001.
  • Markku-Juhani Saarinen "ATTACKS AGAINST THEWAP WTLS PROTOCOL" University of finland
  • Eduardo B. Fernandez" Two patterns for web services security" Florida Atlantic University,Boca Raton, FL 33431, USA
  • Vipul Gupta, Douglas Stebila_, Stephen Fung," Speeding up Secure Web Transactions using Elliptic Curve Cryptography" 2600 Casey Avenue Mountain View, CA 94043.
  • Enhancing Security and Trust on WAP in Mobile Commerce Part 2, Singapore, Fri November 10 2000.
  • Available at this website "http://cryptodox. com/WTLS"
  • Arjen K. Lenstra1, Eric R. Verheul2. " Selecting Cryptographic Key Sizes" GRMS Crypto Group, Goudsbloemstraat 14, 5644 KE Eindhoven, The Netherlands.
  • Thomas Pettersson "WAP Gateway", 2000-03-03.
  • Lars Wirzenius "Kannel Architecture and Design", Gateway architect Wapit Ltd.
  • Anders Hessel and Paul Pettersson," Model-Based Testing of a WAP Gateway: an Industrial Case-Study" Department of Information Technology, Uppsala University, P. O. Box 337.
  • Niels Christian Juul," Niels Christian Juul" Roskilde University, Department of Computer Science, Bled, Slovenia, June 17 - 19, 2002.
  • Michael Schmidt," Consistent M-Commerce Security on Top of GSM-based Data Protocols –A Security Analysis" University of Siegen, Institute for Data Communications Systems,57068 Siegen, Germany.