DocumentCode
2679662
Title
Algorithmic Review of WTLS and TLS for Recommending Measures for Implementing CSP in the Network Gateway
Author
Kamini ; Sharma, Parteek
Author_Institution
Sch. of Comput. Applic., Syst. & Archit. Domain, Lovely Prof. Univ., Phagwara, India
fYear
2012
fDate
14-15 Sept. 2012
Firstpage
286
Lastpage
290
Abstract
Whenever internet connection is used in wireless devices like mobile phones, all the communication from mobile device to web server pass through the gateway. Two security protocols are used in between the wireless device and web server. one protocol named WTLS is used between the wireless device and gateway and other protocol named TLS is used between the gateway and web server. When two protocols are used in between the wireless device and web server then there is a problem of providing end to end security. Most of the research paper discuss about the wireless transport layer security for wireless device and transport layer security for wired device. This research paper suggested a Common security Protocol for wireless device and wired device. Instead of two different security protocols like WTLS and TLS, a common security protocol would be used in between the gateway. In this paper the architecture of common security protocol (CSP) is discussed. This paper focuses on comparative study of various security algorithms used for wireless device and wired device. On the basis of comparative analysis of both security protocols, algorithm would be designed for common security protocol. This algorithm for CSP would work in such way so that end to end security would be improved from wireless device to wired server.
Keywords
Internet; computer network security; file servers; mobile computing; mobile radio; protocols; CSP; Internet connection; TLS protocol; WTLS protocol; Web server; algorithmic review; common security protocol; measure recommendation; mobile device; mobile phones; network gateway; wired device; wireless devices; wireless transport layer security; Communication system security; Logic gates; Security; Servers; Wireless application protocol; Architecture; Client; End to End Security; Server;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing Sciences (ICCS), 2012 International Conference on
Conference_Location
Phagwara
Print_ISBN
978-1-4673-2647-6
Type
conf
DOI
10.1109/ICCS.2012.11
Filename
6391691
Link To Document