Skip to main content

Deployment of Public–Key Infrastructure in Wireless Data Networks

  • Conference paper
  • 450 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2094))

Abstract

Over the last decade there has been a rapid growth in the area of wireless applications. For a wireless application to be successful, it is essential to ensure that the transactions cannot be fraudulently generated, that transactions are legally binding, and that the confidentiality of private information is adequately protected. Such assurance depends upon deployment of public-key infrastructure (PKI) technology in wireless data networks. When wireless devices are used for data communication, they have to face many environmental limitations e.g. limited computing power in wireless devices, inadequate memory space, low network bandwidth and restriction imposed by underlying communication protocols and services. This obviously creates further challenges for protocol designers, implementers and standardization body. This paper discusses the issues involved in implementing PKI in wireless data networks and possible approaches to resolve them. It also provides an overview of today’s mobile system environment and current status of wireless security implementations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Singh, A.K.: E-Commerce Security. Proc. of National Seminar on E-Commerce & Web Enabled Applications at Harcourt Butler Technological Institute, Kanpur, India (2000)

    Google Scholar 

  2. Charles, Arehart et. al.: Professional WAP. Wrox Press Ltd. (2000)

    Google Scholar 

  3. Gilbert Held: NPN:The Wide World of Wireless. Network Magazine (December 1999)

    Google Scholar 

  4. Hasan, S., et. al.: Wireless Data Networks: Reaching the Extra Mile. IEEE Computer (December 1997)

    Google Scholar 

  5. Ramon, J., Hontanon: Encryption 101-The Choices. Sys Admin (1998)

    Google Scholar 

  6. Anita, Karve: PKI Options for Next Generation Security. Network Magazine (March 1999)

    Google Scholar 

  7. Fernandez, A.D.: Elliptic-Curve Cryptography. Dr. Dobb’s Journal (December 1999)

    Google Scholar 

  8. Epharaim, S.: Solutions on the Horizon will Relieve the Two-Zone Wireless Security Problem. InfoWorld.com (Nov. 2000)

    Google Scholar 

  9. http://www.ericsson.com/wapsolutions/common/p11.shtml

  10. http://www.phone.com/pub/Security_WP.pdf

  11. http://www.nokia.com/corporate/wap/future.html

  12. http://www.wapforum.com

  13. http://www.nttdocomo.com/release/index.html

  14. http://www.ntru.com

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Singh, A.K. (2001). Deployment of Public–Key Infrastructure in Wireless Data Networks. In: Networking — ICN 2001. ICN 2001. Lecture Notes in Computer Science, vol 2094. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47734-9_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-47734-9_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42303-4

  • Online ISBN: 978-3-540-47734-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics