0% found this document useful (0 votes)
88 views11 pages

WTLS in WAP: Secure Mobile Protocols

This document discusses Wireless Transport Layer Security (WTLS) which provides privacy, data integrity, and authentication for applications communicating over WAP. WTLS establishes a secure session through a handshake where it negotiates a key exchange suite, cipher suite, and compression method. It then exchanges certificates and commits to the secure connection. Once established, secure data can be exchanged through the SEC-Unitdata primitive, providing unreliable but encrypted communication over the Wireless Datagram Protocol.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views11 pages

WTLS in WAP: Secure Mobile Protocols

This document discusses Wireless Transport Layer Security (WTLS) which provides privacy, data integrity, and authentication for applications communicating over WAP. WTLS establishes a secure session through a handshake where it negotiates a key exchange suite, cipher suite, and compression method. It then exchanges certificates and commits to the secure connection. Once established, secure data can be exchanged through the SEC-Unitdata primitive, providing unreliable but encrypted communication over the Wireless Datagram Protocol.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Wireless Application

Protocol

Mobile Computing
EID 362
Unit - V
Contents
➔ Architecture

➔ Wireless datagram protocol

➔ Wireless transport layer


security
➔ Wireless transaction layer
protocol

➔ Wireless session layer


protocol

➔ Wireless application
environment.
Wireless transport layer security
● If requested by an application, a security service, the wireless
transport layer security (WTLS), can be integrated into the WAP
architecture on top of WDP.
● The primary job of WTLS is to provide privacy, data integrity
and authentication between applications communicating using
WAP. WTLS is based on and provides similar functionality to the
Transport Layer Security (TLS) protocol but is optimized for low
bandwidth mobile devices.
Fig 5.4: WTLS establishing a secure session
Wireless transport layer security
● The first step is to initiate the session with the SEC-Create
primitive. Parameters are source address (SA), source port (SP)
of the originator, destination address (DA), destination port
(DP) of the peer. The originator proposes a key exchange suite
(KES) a cipher suite (CS) and a compression method (CM) .
Wireless transport layer security
● The peer answers with parameters for the sequence number
mode (SNM), the key refresh cycle (KR) (i.e., how often keys are
refreshed within this secure session), the session identifier
(SID) (which is unique with each peer), and the selected key
exchange suite (KES’), cipher suite (CS’), compression method
(CM’).
● The peer also issues a SEC-Exchange primitive. This indicates
that the peer wishes to perform public-key authentication with
the client, i.e., the peer requests a client certificate (CC) from
the originator.
Wireless transport layer security

Fig 5.4: WTLS datagram transfer


Wireless transport layer security
● The originator answers with its certificate and issues a
[Link] primitive. This primitive indicates that the
handshake is completed for the originator’s side and that the
originator now wants to switch into the newly negotiated
connection state.
● The certificate is delivered to the peer side and the SEC-Commit
is indicated. The WTLS layer of the peer sends back a
confirmation to the originator. This concludes the full
handshake for secure session setup. .
Wireless transport layer security
● After setting up a secure connection between two peers, user
data can be exchanged. This is done using the simple
SEC-Unitdata primitive as shown in Figure 5.4. SEC-Unitdata
has exactly the same function as T-DUnitdata on the WDP
layer, namely it transfers a datagram between a sender and a
receiver.
● This data transfer is still unreliable, but is now secure.
Wireless transport layer security
● This shows that WTLS can be easily plugged into the protocol
stack on top of WDP.
● The higher layers simply use SEC-Unitdata instead of
T-DUnitdata.
● The parameters are the same here: source address (SA), source
port (SP), destination address (DA), destination port (DP), and
user data (UD).
Thank You

You might also like