Abstract
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from fixed terminals to wireless mobile devices and the increasing availability of information for such devices impose new challenges in the development of applications. The security and the portability are examples of these challenges that constitute the motivation for this work. Our main goal is to introduce a solution, called MobiS (Mobility and Security), to the development of secure applications for data transmission using wireless technologies.
This work is supported by Instituto Atlântico, FUNCAP, CAPES and CNPq, which are research agencies from Brazil
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Itani, W., Kayssi, A.: J2ME End-to-End Security for M-Commerce. In: Proc. IEEE Wireless Communications and Networking Conference (WCNC 2003), New Orleans, Louisiana, March 2003, pp. 2015–2020 (2003)
The Legion of Bouncy Castle. Cryptography API para Java, Disponível em www.bouncycastle.org (Access in: February 2003)
Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11, pp. 1-9 (2000)
Nunes, B.A.A., Moraes, L.F.M.: Avaliando a Sobrecarga Introduzida nas Redes 802.11 pelos Mecanismos de Segurança WEP e VPN/IPSec. Workshop de segurança - WSEG. In: Anais SBRC 2003 (2003)
RFC 2246, The TLS Protocol version 1.0, Available at http://www.faqs.org/rfcs/rfc2246.html (Access in: August 15, 2003)
Gupta, V., Gupta, S.: Experiments in Wireless Internet Security. In: Wireless Communications and Networking Conference – WCNC 2002, March 2002, vol. 2, pp. 17–21 (2002)
Stallings, W.: Network security essentials: applications and standards/William Stallings, ISBN: 0-13-016093-8
Murthy, U., Bukhres, O., Winn, W., Vanderdez, E.: Firewalls for Security in Wireless Networks, pp. 1–9 (2000)
Kasselman, P.R.: A fast attack on the MD4 hash function. In: Communications and Signal Processing (COMSIG 1997). South African Symposium Proceedings, September 1997, pp. 147–150 (1997)
An Open Specification for Pretty Good Privacy, Available at: http://www.ietf.org/html.charters/openpgp-charter.html (Access in: January 2003)
AES Advanced Encryption Standard. Disponível em, http://csrc.nist.gov/CryptoToolkit/aes/ (Access in: January 2003)
Gilmore, J.: Cracking DES: Secrets of Encryption Research. Wiretap Politics & Chip Design, 272 (1998)
J2ME – Java 2 Platform, Micro Edition, Available at http://java.sun.com/j2me (Access in: September 2002)
Sun[TM] One Studio 5, Standard Edition, Available at: http://wwws.sun.com/software/sundev/jde/buy/index.html (Access in: September 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Viana, W., Filho, B., Magalhães, K., Giovano, C., de Castro, J., Andrade, R. (2004). MobiS: A Solution for the Development of Secure Applications for Mobile Devices. In: de Souza, J.N., Dini, P., Lorenz, P. (eds) Telecommunications and Networking - ICT 2004. ICT 2004. Lecture Notes in Computer Science, vol 3124. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27824-5_124
Download citation
DOI: https://doi.org/10.1007/978-3-540-27824-5_124
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22571-3
Online ISBN: 978-3-540-27824-5
eBook Packages: Springer Book Archive