Abstract
End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.
Similar content being viewed by others
References
Agarwal, A.K., Gill, J.S., Wang, W.: An experimental study on wireless security protocols over mobile IP networks. In: IEEE Proceedings of 60th Vehicular Technology Conference (2004)
BouncyCastle: Bouncy Castle Documentation. (2006) http://www.bouncycastle.org/documentation.html
Dierks, T., Allen, C. The TLS protocol version 1.0, IETF RFC 2246 (1999)
Reynaud-Plantey, D. J2ME low level security: implementation versus specification. (2005) http://prdownloads.source forge.net/tinapoc/Reynaud_J2ME.pdf?download
Intel IEEE 802.11b high rate wireless local area networks, Intel Corporation (2000)
Jøsang, A., Sanderud, G. Security in mobile communications: challenges and opportunities. In: Australasian Information Security Workshop (AISW2003), Australia (2003)
Knudsen, J. Introduction to Wireless Java Technologies White Paper, Sun Microsystems Inc. (2001)
Kwon, E., Cho, Y., Chae, K. Integrated transport layer security: end-to-end security model between WTLS and TLS. In: IEEE Proceedings of 15th International Conference on Information Networking, pp. 65–71 (2001)
Mahmoud, Q.H. Wireless Application Programming with J2ME and Bluetooth. (2003) http://developers.sun.com/tech topics/mobility/midp/articles/bluetooth1/
Mynttinen, J. End-to-end security of mobile data in GSM. Tik-110.501 Seminar on Network Security. Helsinki University of Technology (2000)
Ortiz, E. The Complexity of Developing Mobile Networked Data Services, J2ME Wireless Connection Wizard For Sun ONE Studio. (2006) http://developers.sun.com/techtopics/ mobility/midp/articles/wizard/index.html
Soriano M., Ponce D. (2002) A security and usability proposal for mobile electronic commerce. IEEE Commun Mag 40(8): 62–67
Sun Microsystems: Java 2 Platform Micro Edition (J2ME) Technology for Creating Mobile Devices White Paper, Sun Microsystems Inc (2000)
Sun Microsystems: Connected, Limited Device Configuration 1.0a Specification, Sun Microsystems Inc. (2000)
Sun Microsystems: JSR-000037 Mobile Information Device Profile (MIDP) 1.0 Specification, Sun Microsystems Inc. (2000)
Sun Microsystems: JSR-000118 Mobile Information Device Profile 2.0 Specification, Sun Microsystems Inc. (2002)
Symbian: Symbian on GPRS (2001). (2001) http://www.symbian.com/technology/standard-gprs.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kayayurt, B., Tuglular, T. End-to-end security implementation for mobile devices using TLS protocol. J Comput Virol 2, 87–97 (2006). https://doi.org/10.1007/s11416-006-0017-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-006-0017-x