Downloads: 110 | Views: 259
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.8 / 10
A Survey Paper on Wireless Transport Layer Security
Parmar Paresh B., Ketan Patel
Abstract: WAP is the protocol that is a secure data communication for the wireless environments developed by the WAP Forum. WTLS (Wireless Transport Layer Security) is the proposed protocol for secure communication in the WAP. The purpose of WTLS is to provide secure and efficient services in the wireless Internet environment. However, the existing WTLS handshake protocol has some security problems in several active attacks. Therefore, in this paper, we analyze the securities of the existing protocol, and then propose a security enhanced WTLS Handshake protocol WTLS was specifically designed to conduct secure transactions in the mobile devices, without requiring desktop levels of processing power and memory. WTLS processes security algorithms faster by minimizing protocol overhead, and enables more data compression than the traditional SSL approach. As a result, WTLS can perform security within the constraints of wireless networks. These optimizations mean that smaller, portable devices can communicate securely over the Internet. WTLS also provides a key refresh mechanism to update keys in a secure connection without handshaking. The frequency of the key refresh is agreed on during the handshake. In the key refresh, a new key block is generated using the master secret key, the message sequence number and other parameters.
Keywords: WTLS
Edition: Volume 5 Issue 4, April 2016
Pages: 1743 - 1745
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2000
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 717
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 697
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 697
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 686
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera