Abstract
WAP is the protocol that is a secure data communication for the wireless environments developed by the WAP Forum. WTLS(Wireless Transport Layer Security) is the proposed protocol for secure communication in the WAP. The purpose of WTLS is to provide secure and efficient services in the wireless Internet environment. However, the existing WTLS handshake protocol has some security problems in several active attacks. Therefore, in this paper, we analyze the securities of the existing protocol, and then propose a security enhanced WTLS Handshake protocol.
This work was supported by the University IT Research Center Project by the MIC (Ministry of Information and Communication) Republic of Korea.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Levi, A., Savas, E.: Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. In: Proceedings of the 8th IEEE International Symposium on Computers and Communication, ISCC 2003, pp. 1245–1250 (2003)
Dierks, T., Allen, C.: The TLS Protocol version 1.0, IETF RFC 2246 (January 1999)
WAP Forum, Wireless Application Protocol Wireless Transport Layer Security Specification version, February 18 (2000)
Radhamani, G., Ramasamy, K.: Security Issues in WAP WTLS Protocol. In: IEEE 2002 International Conference on Communication, Circuits and Systems and West Sino Expositions, vol. 1, pp. 483–487 (2002)
Kwak, D.J., Ha, J.C., Lee, H.J., Kim, H.K., Moon, S.J.: A WTLS Handshke Protocol with User Anonymity and Forward Secrecy. In: Lee, J.-Y., Kang, C.-H. (eds.) CIC 2002. LNCS, vol. 2524, pp. 219–230. Springer, Heidelberg (2003)
ANSI, Public Key Cryptography for the finacial services industry : Key agreement and key transport using elliptic curve cryptography, ANSI X9.63 (2001)
Oh, S.H., Kwak, J., Lee, S.W., Won, D.H.: Security Analysis and Applications of Standard key Agreement Protocols. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 191–200. Springer, Heidelberg (2003)
Gunther, C.: An Identity-based Key-exchange Protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29–37. Springer, Heidelberg (1990)
Koblitz, N.: Elliptic curve Cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)
Yang, J.P., Shin, W.S., Rhee, K.H.: An End-to-End Authentication Protocol in Wireless Application Protocol. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 247–259. Springer, Heidelberg (2001)
Zheng, W.: An Authentication and Security Protocol for Mobile Computing. In: Proceeding of IFIP, September 1996, pp. 249–257 (1996)
Go, J.S., Kim, K.J.: Wireless authentication Protocols Preserving User Anonymity. In: SCIS 2001 (January 2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwak, J., Han, J., Oh, S., Won, D. (2004). Security Enhanced WTLS Handshake Protocol. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3045. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24767-8_100
Download citation
DOI: https://doi.org/10.1007/978-3-540-24767-8_100
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22057-2
Online ISBN: 978-3-540-24767-8
eBook Packages: Springer Book Archive