Академический Документы
Профессиональный Документы
Культура Документы
M.Hemavathy
A.Kavitha
S.Sivakumar
Introduction
WAP – Market share
WAP Architecture
WAP Challenges
WTLS
WTLS security challenges
References and resources
SOFTLINE
CL
Location
- based services
Enterprise solutions
Financial services
Travel services
-M Commerce
Lightweight SSL
Uses WIM/PKI-Cards
Hand
- held devices
Smaller display
Different input device
Limited memory
Restricted power consumption
Less powerful CPU
Record Protocol
Record protocol
Bearer networks
Class 1
Anonymous encryption
Data is encrypted
Certificates are not exchanged between client and gateway
Class 2
Encryption with server authentication
Data is encrypted
Client requires a digital certificate from server
Class 3
Encryption with client and server authentication
Data is encrypted
Client and server exchange digital certificates
Man
- in
- the- middle
IP Spoofing
Cellular network
CENTRAL RESEARCH LABORATORY
Infrastructured Networks …
• Device communicate to closest RT tower
• RT tower responsibilities
– Send data meant to nodes under coverage
– Receive data transmitted from nodes under
coverage
– Unreachable destination
• Local tower locates destination
• Retransmit to destination
• Multiple nodes need to retransmit / repeat
Destination
• Security analysis
• Vulnerabilities
• Attacks
• Measures to secure MANET
• Benefits
• Challenges