Studyspark Study Document

Wireless Transport Layer Security and Term Paper

Pages:5 (1919 words)

Sources:1+

Subject:Other

Topic:Transport

Document Type:Term Paper

Document:#80809754


The wireless application models closely follow the internet model. "WAP specifies two essential elements of wireless communication: an end-to-end application protocol and an application environment based on a browser. The application protocol is a layered communication protocol that is embedded in each WAP user agent. The network side includes a server component implementing the other end of the protocol that is capable of communicating with any WAP user agents. The role of the server component is also to act as a gateway to route the request of a user agent to an application server." (Paukkunen, 1999) the server builds a bridge between the networks. This standard defines a browser, and an interpreter. It understands the WML Script. The WML or wireless mark up language is designed to be used in the wireless network and most protocols use the WML scripting procedures. (Paukkunen, 1999)

Conclusion

Wireless band use for communication has revolutionized the use of the internet, communication, and e-commerce and has enhanced accessibility. Following this the need arose to keep intrusion out of these systems and it was proved that internet and LANS were vulnerable to intruders. The wireless systems were found to be more vulnerable to attacks. As a result many security features of WAP servers, browsers, internet hosts and e-commerce follow security protocols designed for wireless applications. The wireless LAN technology is varied with the type of need. Today the 802.11 set of standards and protocols like the Wireless Transport Layer security -- WTLS is prevalent.

References

Andress, Amanda. (2003) "Surviving Security: How to Integrate People, Process, and Technology" Auerbach Publications. Boca Raton, FL.

Gast, Matthew. (2005) "802.11 Wireless Networks: The Definitive Guide"

O'Reilly.

International Engineering Consortium. (n. d.) "Wireless Application Protocol (WAP)"

Retrieved 23 February, 2008 at http://www.iec.org/online/tutorials/wap/topic01.html

Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. (2004, Dec) "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp: 3062-3080.

Macphee, Allan. (2001, Jan) "Understanding Digital Certificates and Wireless Transport

Layer Security (WTLS)" http://www.entrust.net/ssl-resources/pdf/understanding_wtls.pdf

Nichols, Randall K; Lekkas, Panos C. (2002) "Wireless Security: Models, Threats, and Solutions" McGraw-Hill Professional.

Paukkunen, Mintunkukka. (1999) "Wireless Application Protocol" http://www.tml.tkk.fi/Studies/Tik-110.300/1998/Essays/wap_2.html

Searchmobilecomputing.com (2007, Aug) "Mobile and Wireless Protocols http://searchmobilecomputing.techtarget.com/news/article/0,289142,sid40_gci929575,00.html

Searchmobilecomputing.com (n. d.) "Wireless Transport Layer Security" http://searchmobilecomputing.techtarget.com/sDefinition/0,sid40_gci549100,00.html

Sklavos, N; Kitsos, P; Papadopoulos, K; Koufopavlou, O. (2006, Apr) "Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security" the Journal of Supercomputing, vol. 36, no. 1, pp: 33-50.

WIRELESS"


Sample Source(s) Used

References

Andress, Amanda. (2003) "Surviving Security: How to Integrate People, Process, and Technology" Auerbach Publications. Boca Raton, FL.

Gast, Matthew. (2005) "802.11 Wireless Networks: The Definitive Guide"

O'Reilly.

International Engineering Consortium. (n. d.) "Wireless Application Protocol (WAP)"

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Network and Computer Security

Pages: 6 (1914 words) Sources: 6 Subject: Business Document: #29271156

Computer and Network Security Description of Information Environment of my Workplace My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of

Studyspark Study Document

Information Technology IT Security Systems

Pages: 11 (3128 words) Sources: 7 Subject: Education - Computers Document: #51446477

Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

Studyspark Study Document

Security Auditing Strategy for FX Hospital EHR EMR Website

Pages: 10 (2990 words) Sources: 5 Subject: Sports - Drugs Document: #97278498

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

Studyspark Study Document

IT Security Assessments Process of Matching Security

Pages: 12 (3712 words) Sources: 5 Subject: Education - Computers Document: #24815663

IT Security Assessments (Process of matching security policies against the architecture of the system in order to measure compliance The systems security assessment is the method of creating a security policy that would be complimentary to the architecture of the system and the method would allow for the measure of compliance. Security assessments are activities that belong to the phase of the design cycle, and that is because it is

Studyspark Study Document

Security in Communication Challenges

Pages: 10 (2871 words) Sources: 11 Subject: Communication Document: #73429324

Chapter 1: Introduction
Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the

Studyspark Study Document

Wireless Local Area Networks

Pages: 5 (1716 words) Sources: 1+ Subject: Physics Document: #75477306

Wireless Local Area Network The advent of networking more particularly the Local Area Network has its origin to the growing necessity of the user to have access and share much more data, application and other services than they could otherwise store by themselves in their own computer. Each LAN has to follow a particular topology which depicts physical arrangement of the nodes and logical method by which the data is transferred.

Join thousands of other students and

"spark your studies".