Wireless Transport Layer Security And Term Paper

PAGES
5
WORDS
1919
Cite

The application protocol is a layered communication protocol that is embedded in each WAP user agent. The network side includes a server component implementing the other end of the protocol that is capable of communicating with any WAP user agents. The role of the server component is also to act as a gateway to route the request of a user agent to an application server." (Paukkunen, 1999) the server builds a bridge between the networks. This standard defines a browser, and an interpreter. It understands the WML Script. The WML or wireless mark up language is designed to be used in the wireless network and most protocols use the WML scripting procedures. (Paukkunen, 1999) Conclusion

Wireless band use for communication has revolutionized the use of the internet, communication, and e-commerce and has enhanced accessibility. Following this the need arose to keep intrusion out of these systems and it was proved that internet and LANS were vulnerable to intruders. The wireless systems were found to be more vulnerable to attacks. As a result many security features of WAP servers, browsers, internet hosts and e-commerce follow security protocols designed for wireless applications. The wireless LAN technology is varied with the type of need. Today the 802.11 set of standards and protocols like the Wireless Transport Layer security -- WTLS is prevalent.

References

Andress, Amanda. (2003) "Surviving Security: How to Integrate People, Process, and Technology" Auerbach Publications. Boca Raton, FL.

Gast,...

...

(2005) "802.11 Wireless Networks: The Definitive Guide"
O'Reilly.

International Engineering Consortium. (n. d.) "Wireless Application Protocol (WAP)"

Retrieved 23 February, 2008 at http://www.iec.org/online/tutorials/wap/topic01.html

Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. (2004, Dec) "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp: 3062-3080.

Macphee, Allan. (2001, Jan) "Understanding Digital Certificates and Wireless Transport

Layer Security (WTLS)" http://www.entrust.net/ssl-resources/pdf/understanding_wtls.pdf

Nichols, Randall K; Lekkas, Panos C. (2002) "Wireless Security: Models, Threats, and Solutions" McGraw-Hill Professional.

Paukkunen, Mintunkukka. (1999) "Wireless Application Protocol" http://www.tml.tkk.fi/Studies/Tik-110.300/1998/Essays/wap_2.html

Searchmobilecomputing.com (2007, Aug) "Mobile and Wireless Protocols http://searchmobilecomputing.techtarget.com/news/article/0,289142,sid40_gci929575,00.html

Searchmobilecomputing.com (n. d.) "Wireless Transport Layer Security" http://searchmobilecomputing.techtarget.com/sDefinition/0,sid40_gci549100,00.html

Sklavos, N; Kitsos, P; Papadopoulos, K; Koufopavlou, O. (2006, Apr) "Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security" the Journal of Supercomputing, vol. 36, no. 1, pp: 33-50.

WIRELESS"

Sources Used in Documents:

References

Andress, Amanda. (2003) "Surviving Security: How to Integrate People, Process, and Technology" Auerbach Publications. Boca Raton, FL.

Gast, Matthew. (2005) "802.11 Wireless Networks: The Definitive Guide"

O'Reilly.

International Engineering Consortium. (n. d.) "Wireless Application Protocol (WAP)"
Retrieved 23 February, 2008 at http://www.iec.org/online/tutorials/wap/topic01.html
Layer Security (WTLS)" http://www.entrust.net/ssl-resources/pdf/understanding_wtls.pdf
Paukkunen, Mintunkukka. (1999) "Wireless Application Protocol" http://www.tml.tkk.fi/Studies/Tik-110.300/1998/Essays/wap_2.html
Searchmobilecomputing.com (2007, Aug) "Mobile and Wireless Protocols http://searchmobilecomputing.techtarget.com/news/article/0,289142,sid40_gci929575,00.html
Searchmobilecomputing.com (n. d.) "Wireless Transport Layer Security" http://searchmobilecomputing.techtarget.com/sDefinition/0,sid40_gci549100,00.html


Cite this Document:

"Wireless Transport Layer Security And" (2008, February 25) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/wireless-transport-layer-security-and-31963

"Wireless Transport Layer Security And" 25 February 2008. Web.25 April. 2024. <
https://www.paperdue.com/essay/wireless-transport-layer-security-and-31963>

"Wireless Transport Layer Security And", 25 February 2008, Accessed.25 April. 2024,
https://www.paperdue.com/essay/wireless-transport-layer-security-and-31963

Related Documents

Computer and Network Security Description of Information Environment of my Workplace My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of

Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

IT Security Assessments (Process of matching security policies against the architecture of the system in order to measure compliance The systems security assessment is the method of creating a security policy that would be complimentary to the architecture of the system and the method would allow for the measure of compliance. Security assessments are activities that belong to the phase of the design cycle, and that is because it is

Chapter 1: Introduction Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination

Wireless Local Area Network The advent of networking more particularly the Local Area Network has its origin to the growing necessity of the user to have access and share much more data, application and other services than they could otherwise store by themselves in their own computer. Each LAN has to follow a particular topology which depicts physical arrangement of the nodes and logical method by which the data is transferred.