Verified Document

Wireless Transport Layer Security And Term Paper

The application protocol is a layered communication protocol that is embedded in each WAP user agent. The network side includes a server component implementing the other end of the protocol that is capable of communicating with any WAP user agents. The role of the server component is also to act as a gateway to route the request of a user agent to an application server." (Paukkunen, 1999) the server builds a bridge between the networks. This standard defines a browser, and an interpreter. It understands the WML Script. The WML or wireless mark up language is designed to be used in the wireless network and most protocols use the WML scripting procedures. (Paukkunen, 1999) Conclusion

Wireless band use for communication has revolutionized the use of the internet, communication, and e-commerce and has enhanced accessibility. Following this the need arose to keep intrusion out of these systems and it was proved that internet and LANS were vulnerable to intruders. The wireless systems were found to be more vulnerable to attacks. As a result many security features of WAP servers, browsers, internet hosts and e-commerce follow security protocols designed for wireless applications. The wireless LAN technology is varied with the type of need. Today the 802.11 set of standards and protocols like the Wireless Transport Layer security -- WTLS is prevalent.

References

Andress, Amanda. (2003) "Surviving Security: How to Integrate People, Process, and Technology" Auerbach Publications. Boca Raton, FL.

Gast,...

(2005) "802.11 Wireless Networks: The Definitive Guide"
O'Reilly.

International Engineering Consortium. (n. d.) "Wireless Application Protocol (WAP)"

Retrieved 23 February, 2008 at http://www.iec.org/online/tutorials/wap/topic01.html

Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. (2004, Dec) "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp: 3062-3080.

Macphee, Allan. (2001, Jan) "Understanding Digital Certificates and Wireless Transport

Layer Security (WTLS)" http://www.entrust.net/ssl-resources/pdf/understanding_wtls.pdf

Nichols, Randall K; Lekkas, Panos C. (2002) "Wireless Security: Models, Threats, and Solutions" McGraw-Hill Professional.

Paukkunen, Mintunkukka. (1999) "Wireless Application Protocol" http://www.tml.tkk.fi/Studies/Tik-110.300/1998/Essays/wap_2.html

Searchmobilecomputing.com (2007, Aug) "Mobile and Wireless Protocols http://searchmobilecomputing.techtarget.com/news/article/0,289142,sid40_gci929575,00.html

Searchmobilecomputing.com (n. d.) "Wireless Transport Layer Security" http://searchmobilecomputing.techtarget.com/sDefinition/0,sid40_gci549100,00.html

Sklavos, N; Kitsos, P; Papadopoulos, K; Koufopavlou, O. (2006, Apr) "Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security" the Journal of Supercomputing, vol. 36, no. 1, pp: 33-50.

WIRELESS"

Sources used in this document:
References

Andress, Amanda. (2003) "Surviving Security: How to Integrate People, Process, and Technology" Auerbach Publications. Boca Raton, FL.

Gast, Matthew. (2005) "802.11 Wireless Networks: The Definitive Guide"

O'Reilly.

International Engineering Consortium. (n. d.) "Wireless Application Protocol (WAP)"
Retrieved 23 February, 2008 at http://www.iec.org/online/tutorials/wap/topic01.html
Layer Security (WTLS)" http://www.entrust.net/ssl-resources/pdf/understanding_wtls.pdf
Paukkunen, Mintunkukka. (1999) "Wireless Application Protocol" http://www.tml.tkk.fi/Studies/Tik-110.300/1998/Essays/wap_2.html
Searchmobilecomputing.com (2007, Aug) "Mobile and Wireless Protocols http://searchmobilecomputing.techtarget.com/news/article/0,289142,sid40_gci929575,00.html
Searchmobilecomputing.com (n. d.) "Wireless Transport Layer Security" http://searchmobilecomputing.techtarget.com/sDefinition/0,sid40_gci549100,00.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Network and Computer Security
Words: 1914 Length: 6 Document Type: Essay

Computer and Network Security Description of Information Environment of my Workplace My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of

Information Technology IT Security Systems
Words: 3128 Length: 11 Document Type: Essay

Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

Security Auditing Strategy for FX Hospital EHR EMR Website
Words: 2990 Length: 10 Document Type:

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

IT Security Assessments Process of Matching Security
Words: 3712 Length: 12 Document Type: Essay

IT Security Assessments (Process of matching security policies against the architecture of the system in order to measure compliance The systems security assessment is the method of creating a security policy that would be complimentary to the architecture of the system and the method would allow for the measure of compliance. Security assessments are activities that belong to the phase of the design cycle, and that is because it is

Security in Communication Challenges
Words: 2871 Length: 10 Document Type: Research Paper

Chapter 1: Introduction Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination

Wireless Local Area Networks
Words: 1716 Length: 5 Document Type: Term Paper

Wireless Local Area Network The advent of networking more particularly the Local Area Network has its origin to the growing necessity of the user to have access and share much more data, application and other services than they could otherwise store by themselves in their own computer. Each LAN has to follow a particular topology which depicts physical arrangement of the nodes and logical method by which the data is transferred.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now