Open Access Open Access  Restricted Access Subscription or Fee Access

Security in Mobile Communication Using Digital Signature with WAP

D. Revathi, K. Ravikumar

Abstract


As mobile networks expand their bandwidth, mobile phones, as with any other Internet device, become substantially exposed to Internet security vulnerabilities. Public key cryptography is a primary concept in implementing wireless device security. This paper describes the applicative use of PKI in current and future mobile phone applications, and shows how the standard-compliant implementation of cryptographic algorithms, enables wireless devices to become PKI-enabled. The Wireless Application Protocol is a leading technology for companies trying to unlock the value of the Mobile Internet. The WAP model introduces a Gateway that translates between WAP and Internet protocols. This Gateway is typically located at the site of the mobile operator, although sometimes it may be run by an application service provider or enterprise. WAP enables such capability via use of a crypto API, referred to as the WMLScript Crypto API. WMLScript is a simple script language that allows client-side processing, and instructs the client device to invoke application-level functions.

Keywords


Cryptography, Private-key cryptography, Public-key cryptography, Public Key Infrastructure.

Full Text:

PDF

References


Mobile computing opportunities and challenges ,Pg: 80 - 85 ACM, NewYork, USA, 2008

WireLess Application Protocols, Wikipedia, Encyclopedia

Digital Signatures, Katz, Jonathan, 1st Edition. 2nd Printing., 2010

Cryptography and Network Security, By William Stallings,2007

Applied Cryptography and Data Security, Prof. Christof Paar, Ruhr-Universitat Bochum, Germany.

Cryptography and Network Security: Principles and Practice, William Stallings - 2010 Pg. 66-70,266-270, 300-310

Wireless Communication, sintef.no. http://www.sintef.no/content/page1-11881.aspx. Retrieved 2008-03-16.

Security and Communication Networks - Wiley InterScience, 30 Mar 2010, Pg 99-101,207-216)

SPAM: Secure Protocol for Authentication in Mobile-Communications, Manik Lal Das, Ashutosh Saxena, icmb, pp.23-27, International Conference on Mobile Business ,2005

Enhanced authentication scheme with anonymity for roaming service in global mobility networks, Computer Communications, Chin-Chen Chang , Chia-Yin Lee , Yen-Chang Chiu, , p.611-618, March, 2009.

Identity management: perspectives on the technological, business, By David G.W. Birch-2007.

Web services security provides message integrity, confidentiality, and authentication, Last updated: Mar 17, 2010 http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/com.ibm.websphere.express.doc/info/exp/ae/cwbs_wssmessage.html

End-to-end security and message protection in a WebSphere MQ client/server environment, Abhishek Jha, Mehak Mahajan, IBM Tivoli Access Manager for Business Integration team, IBM.

Security and Privacy in Mobile Information and Communication Systems Summary, Springer, 2009 .

http://ebook30.com/security/security/188081/security-and-privacy-in-mobile-information-and-communication-systems.html#ixzz0nGFWfv3p

Key Wireless and Mobile Themes from Interop 2010, By Craig Mathias

Cris Pedregal-Martin , Krithi Ramamritham, Support for Recovery in Mobile Systems, IEEE Transactions on Computers, v.51 n.10, p.1219-1224, October 2002 URL: [www.portal.acm.org/doi/10.1109/TC.2002.1039847]

Whitfield Diffie and Martin Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644–654.

Whitfield Diffie and Martin Hellman, "Multi-user cryptographic techniques" [Diffie and Hellman, AFIPS Proceedings 45, pp109–112, June 8, 1976].

David Kahn, "Cryptology Goes Public", 58 Foreign Affairs 141, 151 (fall 1979), p. 153.

R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 (2), pp.120–126. 1978.

G. Blakley. "Safeguarding cryptographic keys." In Proceedings of AFIPS 1979, volume 48, pp. 313–317, June 1979.

WAP Forum, ―Wireless Application Protocol Architecture Specification, WAP-100- WAPArch-19980430-a‖, WAP Forum Specifications 30-Apr-1998version,URL: http://www.openmobilealliance.org/tech/affiliates/wap/wapindex.html

WAP Forum, ―Wireless Application Protocol Wireless Application Environment Specification Version 1.3, WAP-190-WAESpec‖, WAP Forum Specifications 29-March-2000 version, URL: http://www.openmobilealliance.org/tech/affiliates/wap/wapindex.html

WAP Forum, ―Wireless Application Protocol Wireless Telephony Application Specification, WAP-169-WTA-20000707-a‖, WAP Forum Specifications 07-Jul-2000 version,URL: http://www.openmobilealliance.org/ tech/affiliates/wap/ wapindex.html

R. Hillebrand, and T. Wierlemann, ―Mobile Internet Guide‖, URL: http://mobileinternetguide.org/ ―

URL:http://www.openmobilealliance.org/tech/ affiliates/wap/wapindex.html

URL:http://www.openmobilealliance.org/ tech/affiliates/wap/wapindex.html

http://www.techweb.com/encyclopedia/defineterm.jhtml?term=digitalsignature

Wireless Application Forum Ltd., Wireless Application Protocol Architecture Specification.,

Wireless Application Forum Ltd., Wireless Markup Language Specification.

Wireless Application Forum Ltd., WMLScript Language Specification.

Wireless Application Forum Ltd., WAP Transport Layer E2E Security Specification.

Wireless Application Forum Ltd., WMLScript Crypto Library.

Wireless Application Forum Ltd., WAP WTLS.

R. Fielding and J. Gettys and J. Mogul and H. Frystyk and T. Berners-Lee., RFC2068., Hypertext Transfer Protocol HTTP/1.1

T. Dierks and C. Allen., RFC2246, The TLS Protocol Version 1

Philip Cox, ―An investigation into the security issues surrounding data transmission and user anonymity using the global system for mobile communications‖http://www.alanta.demon.co.uk/GSMPaper/Title.html

D. Gollman, ―Computer Security‖ ―John Wiley & Sons, 1999‖


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.