An end-to-end authentication protocol in wireless application protocol

2Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile commerce is becoming more and more commonplace, but security is still a major concern. To provide security, theWAP (Wireless Application Protocol) forum suggests theWAP security architecture. However, it needs theWAP gateway for intermediate process between the WTLS (Wireless Transport Layer Security) and the SSL (Secure Socket Layer) protocol, and it does not guarantee end-to-end security between the mobile devices and the WAP servers. In this paper, we propose a new authentication protocol to solve this problem. Our solution is based on the design of a new network component that is called CRL-agent. Furthermore, we also analyze and evaluate the security strength of the proposed protocol.

Cite

CITATION STYLE

APA

Yang, J. P., Shin, W., & Rhee, K. H. (2001). An end-to-end authentication protocol in wireless application protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2119, pp. 247–259). Springer Verlag. https://doi.org/10.1007/3-540-47719-5_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free