Integrated transport layer security: End-to-end security model between WTLS and TLS

被引:10
|
作者
Kwon, EK
Cho, YG
Chae, KJ
机构
关键词
D O I
10.1109/ICOIN.2001.905331
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-to-end security is nor supported unless a WAP gateway is operated by the content provider: We propose ITLS mechanism to solve the WAP security problem. The goal of ITLS is to prohibit the WAP gateway from having the plain text message assuming the gateway doesn't belong to the content provider In ITLS, the security partner of a Web server is not a gateway but a client, the client encrypts twice times for the Web server and the gateway in the order named. To support these functions, IniCertificate and IntClientKeyExchange message types are added in ITLS handshake protocol, application data encryption and decryption rules are modified. It is one drawback that ITLS enabled mobile devices might have many loads than WTLS because of encryption and decryption twice times.
引用
收藏
页码:65 / 71
页数:7
相关论文
共 50 条
  • [41] Scalable end-to-end security for advanced metering infrastructures
    Nabeel, Mohamed
    Ding, Xiaoyu
    Seo, Seung-Hyun
    Bertino, Elisa
    [J]. INFORMATION SYSTEMS, 2015, 53 : 213 - 223
  • [42] Methodology and Tools for End-to-End SOA Security Configurations
    Satoh, Fumiko
    Tatsubori, Michiaki
    Nakamura, Yuichi
    Mukhi, Nirmal K.
    Ono, Kouichi
    [J]. IEEE CONGRESS ON SERVICES 2008, PT I, PROCEEDINGS, 2008, : 307 - +
  • [43] Reducing risk with end-to-end application security automation
    Blake C.
    [J]. 1600, Elsevier Ltd (2020): : 6 - 8
  • [44] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    [J]. IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [45] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [46] Establishing End-to-End Security in a Nationwide Network for Telecooperation
    Staemmler, Martin
    Walz, Michael
    Weisser, Gerald
    Engelmann, Uwe
    Weininger, Robert
    Ernstberger, Antonio
    Sturm, Johannes
    [J]. QUALITY OF LIFE THROUGH QUALITY OF INFORMATION, 2012, 180 : 512 - 516
  • [47] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    [J]. 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [48] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    [J]. COMPUTER, 2018, 51 (04) : 20 - 27
  • [49] End-to-end Security for Sleepy Smart Object Networks
    Sethi, Mohit
    Arkko, Jari
    Keranen, Ari
    [J]. PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
  • [50] End-to-End Security Methods for UDT Data Transmissions
    Bernardo, Danilo Valeros
    Hoang, Doan B.
    [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393