Skip to main content

Advertisement

Log in

End-to-end security implementation for mobile devices using TLS protocol

  • Original Paper
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Agarwal, A.K., Gill, J.S., Wang, W.: An experimental study on wireless security protocols over mobile IP networks. In: IEEE Proceedings of 60th Vehicular Technology Conference (2004)

  2. BouncyCastle: Bouncy Castle Documentation. (2006) http://www.bouncycastle.org/documentation.html

  3. Dierks, T., Allen, C. The TLS protocol version 1.0, IETF RFC 2246 (1999)

  4. Reynaud-Plantey, D. J2ME low level security: implementation versus specification. (2005) http://prdownloads.source forge.net/tinapoc/Reynaud_J2ME.pdf?download

  5. Intel IEEE 802.11b high rate wireless local area networks, Intel Corporation (2000)

  6. Jøsang, A., Sanderud, G. Security in mobile communications: challenges and opportunities. In: Australasian Information Security Workshop (AISW2003), Australia (2003)

  7. Knudsen, J. Introduction to Wireless Java Technologies White Paper, Sun Microsystems Inc. (2001)

  8. Kwon, E., Cho, Y., Chae, K. Integrated transport layer security: end-to-end security model between WTLS and TLS. In: IEEE Proceedings of 15th International Conference on Information Networking, pp. 65–71 (2001)

  9. Mahmoud, Q.H. Wireless Application Programming with J2ME and Bluetooth. (2003) http://developers.sun.com/tech topics/mobility/midp/articles/bluetooth1/

  10. Mynttinen, J. End-to-end security of mobile data in GSM. Tik-110.501 Seminar on Network Security. Helsinki University of Technology (2000)

  11. Ortiz, E. The Complexity of Developing Mobile Networked Data Services, J2ME Wireless Connection Wizard For Sun ONE Studio. (2006) http://developers.sun.com/techtopics/ mobility/midp/articles/wizard/index.html

  12. Soriano M., Ponce D. (2002) A security and usability proposal for mobile electronic commerce. IEEE Commun Mag 40(8): 62–67

    Article  Google Scholar 

  13. Sun Microsystems: Java 2 Platform Micro Edition (J2ME) Technology for Creating Mobile Devices White Paper, Sun Microsystems Inc (2000)

  14. Sun Microsystems: Connected, Limited Device Configuration 1.0a Specification, Sun Microsystems Inc. (2000)

  15. Sun Microsystems: JSR-000037 Mobile Information Device Profile (MIDP) 1.0 Specification, Sun Microsystems Inc. (2000)

  16. Sun Microsystems: JSR-000118 Mobile Information Device Profile 2.0 Specification, Sun Microsystems Inc. (2002)

  17. Symbian: Symbian on GPRS (2001). (2001) http://www.symbian.com/technology/standard-gprs.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baris Kayayurt.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kayayurt, B., Tuglular, T. End-to-end security implementation for mobile devices using TLS protocol. J Comput Virol 2, 87–97 (2006). https://doi.org/10.1007/s11416-006-0017-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-006-0017-x

Keywords