International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 259

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.8 / 10


     

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel


Abstract: WAP is the protocol that is a secure data communication for the wireless environments developed by the WAP Forum. WTLS (Wireless Transport Layer Security) is the proposed protocol for secure communication in the WAP. The purpose of WTLS is to provide secure and efficient services in the wireless Internet environment. However, the existing WTLS handshake protocol has some security problems in several active attacks. Therefore, in this paper, we analyze the securities of the existing protocol, and then propose a security enhanced WTLS Handshake protocol WTLS was specifically designed to conduct secure transactions in the mobile devices, without requiring desktop levels of processing power and memory. WTLS processes security algorithms faster by minimizing protocol overhead, and enables more data compression than the traditional SSL approach. As a result, WTLS can perform security within the constraints of wireless networks. These optimizations mean that smaller, portable devices can communicate securely over the Internet. WTLS also provides a key refresh mechanism to update keys in a secure connection without handshaking. The frequency of the key refresh is agreed on during the handshake. In the key refresh, a new key block is generated using the master secret key, the message sequence number and other parameters.


Keywords: WTLS


Edition: Volume 5 Issue 4, April 2016


Pages: 1743 - 1745



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Parmar Paresh B., Ketan Patel, "A Survey Paper on Wireless Transport Layer Security", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 1743-1745, URL: https://www.ijsr.net/getabstract.php?paperid=NOV162975, DOI: https://www.doi.org/10.21275/NOV162975



Downloads: 656 | Views: 2000

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 717

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 697

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 697

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 686

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top