Integrated transport layer security: End-to-end security model between WTLS and TLS

被引:10
|
作者
Kwon, EK
Cho, YG
Chae, KJ
机构
关键词
D O I
10.1109/ICOIN.2001.905331
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-to-end security is nor supported unless a WAP gateway is operated by the content provider: We propose ITLS mechanism to solve the WAP security problem. The goal of ITLS is to prohibit the WAP gateway from having the plain text message assuming the gateway doesn't belong to the content provider In ITLS, the security partner of a Web server is not a gateway but a client, the client encrypts twice times for the Web server and the gateway in the order named. To support these functions, IniCertificate and IntClientKeyExchange message types are added in ITLS handshake protocol, application data encryption and decryption rules are modified. It is one drawback that ITLS enabled mobile devices might have many loads than WTLS because of encryption and decryption twice times.
引用
收藏
页码:65 / 71
页数:7
相关论文
共 50 条
  • [1] Internet of Things: An End-to-End Security Layer
    Behrens, Reinhard
    Ahmed, Ali
    [J]. PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 146 - 149
  • [2] End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices
    Granjal, Jorge
    Monteiro, Edmundo
    [J]. 2016 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2016, : 306 - 314
  • [3] End-to-end security implementation for mobile devices using TLS protocol
    Kayayurt, Baris
    Tuglular, Tugkan
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97
  • [4] End-to-end security implementation for mobile devices using TLS protocol
    Baris Kayayurt
    Tugkan Tuglular
    [J]. Journal in Computer Virology, 2006, 2 (1): : 87 - 97
  • [5] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [6] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [7] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [8] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [9] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [10] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107