Integrated transport layer security: End-to-end security model between WTLS and TLS

Eun Kyeong Kwon, Yong Gu Cho, Ki Joon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

18 Scopus citations

Abstract

WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-to-end security is not supported unless a WAP gateway is operated by the content provider. We propose the ITLS mechanism to solve the WAP security problem. The goal of ITLS is to prohibit the WAP gateway from having a plain text message assuming the gateway doesn't belong to the content provider. In ITLS, the security partner of a Web server is not a gateway but a client, the client encrypts twice for the Web server and the gateway in the order named. To support these functions, IniCertificate and IntClientKeyExchange message types are added in ITLS handshake protocol, application data encryption and decryption rules are modified. It is one drawback that ITLS enabled mobile devices might have more loads than WTLS because of encryption and decryption.

Original languageEnglish
Title of host publicationProceedings - 15th International Conference on Information Networking, ICOIN 2001
PublisherIEEE Computer Society
Pages65-71
Number of pages7
ISBN (Electronic)0769509517
DOIs
StatePublished - 2001
Event15th International Conference on Information Networking, ICOIN 2001 - Beppu City, Oita, Japan
Duration: 31 Jan 20012 Feb 2001

Publication series

NameInternational Conference on Information Networking
Volume2001-January
ISSN (Print)1976-7684

Conference

Conference15th International Conference on Information Networking, ICOIN 2001
Country/TerritoryJapan
CityBeppu City, Oita
Period31/01/012/02/01

Bibliographical note

Publisher Copyright:
© 2001 IEEE.

Keywords

  • Bandwidth
  • Cryptography
  • Data security
  • Delay
  • HTML
  • Internet
  • TCPIP
  • Web server
  • Wireless application protocol
  • Wireless networks

Fingerprint

Dive into the research topics of 'Integrated transport layer security: End-to-end security model between WTLS and TLS'. Together they form a unique fingerprint.

Cite this