CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Key Resolution of Reencryption by Providing Paging in Between the Gateway

Published on November 2012 by Kamini, Rajiv Mahajan, Prateek Sharma
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 4
November 2012
Authors: Kamini, Rajiv Mahajan, Prateek Sharma
50a974b9-3c53-480c-9720-1c668a630485

Kamini, Rajiv Mahajan, Prateek Sharma . Key Resolution of Reencryption by Providing Paging in Between the Gateway. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 4 (November 2012), 1-5.

@article{
author = { Kamini, Rajiv Mahajan, Prateek Sharma },
title = { Key Resolution of Reencryption by Providing Paging in Between the Gateway },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 4 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/ctngc/number4/9069-1020/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Kamini
%A Rajiv Mahajan
%A Prateek Sharma
%T Key Resolution of Reencryption by Providing Paging in Between the Gateway
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 4
%P 1-5
%D 2012
%I International Journal of Computer Applications
Abstract

The Internet use in mobile has increased day by day . Every user want to access the Internet through mobile phones instead of laptop because of its feature like small in size and portable. When mobile user wants to access the Internet on mobile then all the request goes to the wireless gateway . The gateway acts as intermediate between the two points either it can be from wireless to wired or vice versa. The request of mobile phone is transferred from WAP device to web server through the gateway . The gateway is also a protocol translator which translate all the protocols used by wireless device to wired network. The problem of existing system was hole in the gateway . This paper has discussed about the problem of the WAP gateway . This paper focused on implementation of hashing technique in between the networking gateway to provide a solution of Re-encryption.

References
  1. Available in the link "http://www. lovelysms. com/mobile-phone-wap-technology. htm"
  2. Philip J Mikal,"An introduction to WAP security at the network protocol layer-WTLS" ,Nov 1,2001
  3. Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae,"Integrated Transport Layer Security :End to End security model between WTLS and TLS", Kaywon School of Art and Design, Youngdong University, Ewha Womans University
  4. Thanh V. Do," WAP Security:WTLS" . INFT 931,May 4,2001 Professor Kris Gaj,Secure Telecommunication System.
  5. Albert Levi, Erkay Savas," Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol" Sabanci University,Istanbul, Turkey.
  6. Eduardo B. Fernandez, Imad Jawhar, Maria M. Larrondo-Petrie, and Michael VanHilst," An overview of the security of wireless networks" Dept. of Computer Science and Engineering,Florida Atlantic University
  7. Thanh V. Do," Project Specification for Analyzing of theWireless Transport Layer Security(WTLS) Applications". March 15, 2001, INFT 931
  8. PHILIP J MIKAL"An Introduction to WAP Security at the Network Protocol Layer — WTLS"2001.
  9. Markku-Juhani Saarinen "ATTACKS AGAINST THEWAP WTLS PROTOCOL" University of finland
  10. Eduardo B. Fernandez" Two patterns for web services security" Florida Atlantic University,Boca Raton, FL 33431, USA
  11. Vipul Gupta, Douglas Stebila_, Stephen Fung," Speeding up Secure Web Transactions using Elliptic Curve Cryptography" 2600 Casey Avenue Mountain View, CA 94043.
  12. Enhancing Security and Trust on WAP in Mobile Commerce Part 2, Singapore, Fri November 10 2000.
  13. Available at this website "http://cryptodox. com/WTLS"
  14. Arjen K. Lenstra1, Eric R. Verheul2. " Selecting Cryptographic Key Sizes" GRMS Crypto Group, Goudsbloemstraat 14, 5644 KE Eindhoven, The Netherlands.
  15. Thomas Pettersson "WAP Gateway", 2000-03-03.
  16. Lars Wirzenius "Kannel Architecture and Design", Gateway architect Wapit Ltd.
  17. Anders Hessel and Paul Pettersson," Model-Based Testing of a WAP Gateway: an Industrial Case-Study" Department of Information Technology, Uppsala University, P. O. Box 337.
  18. Niels Christian Juul," Niels Christian Juul" Roskilde University, Department of Computer Science, Bled, Slovenia, June 17 - 19, 2002.
  19. Michael Schmidt," Consistent M-Commerce Security on Top of GSM-based Data Protocols –A Security Analysis" University of Siegen, Institute for Data Communications Systems,57068 Siegen, Germany.
Index Terms

Computer Science
Information Sciences

Keywords

Wap Security Client Server Gateway