Integrated transport layer security: End-to-end security model between WTLS and TLS

被引:10
|
作者
Kwon, EK
Cho, YG
Chae, KJ
机构
关键词
D O I
10.1109/ICOIN.2001.905331
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-to-end security is nor supported unless a WAP gateway is operated by the content provider: We propose ITLS mechanism to solve the WAP security problem. The goal of ITLS is to prohibit the WAP gateway from having the plain text message assuming the gateway doesn't belong to the content provider In ITLS, the security partner of a Web server is not a gateway but a client, the client encrypts twice times for the Web server and the gateway in the order named. To support these functions, IniCertificate and IntClientKeyExchange message types are added in ITLS handshake protocol, application data encryption and decryption rules are modified. It is one drawback that ITLS enabled mobile devices might have many loads than WTLS because of encryption and decryption twice times.
引用
收藏
页码:65 / 71
页数:7
相关论文
共 50 条
  • [21] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [22] The study on end-to-end security for ubiquitous commerce
    Hangbae Chang
    [J]. The Journal of Supercomputing, 2011, 55 : 228 - 245
  • [23] Bluetooth Technology: ApXLgLevel End-to-End Security
    Rao, K. V. Bheemeswara
    Ravi, N.
    Bhushan, R. Phani
    Kumar, K. Pramod
    Venkataraman, S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [24] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    [J]. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [25] The study on end-to-end security for ubiquitous commerce
    Chang, Hangbae
    [J]. JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 228 - 245
  • [26] An end-to-end hardware approach security for the GPRS
    Kitsos, P
    Sklavos, N
    Koufopavlou, O
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794
  • [27] Design of End-To-End Security for MQTT 5.0
    Chien, Hung-Yu
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 353 - 363
  • [28] Flexible End-to-End Content Security in CCN
    Wood, Christopher A.
    Uzun, Ersin
    [J]. 2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [29] DEVICE IDENTITY MANAGEMENT AND END-TO-END SECURITY
    Latour, Jacques
    D'Souza, Natasha
    [J]. IEEE NETWORK, 2021, 35 (05): : 8 - 9
  • [30] An end-to-end home network security framework
    Tak, S
    Dixit, S
    Park, EK
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (05) : 412 - 422