DocumentCode :
2679662
Title :
Algorithmic Review of WTLS and TLS for Recommending Measures for Implementing CSP in the Network Gateway
Author :
Kamini ; Sharma, Parteek
Author_Institution :
Sch. of Comput. Applic., Syst. & Archit. Domain, Lovely Prof. Univ., Phagwara, India
fYear :
2012
fDate :
14-15 Sept. 2012
Firstpage :
286
Lastpage :
290
Abstract :
Whenever internet connection is used in wireless devices like mobile phones, all the communication from mobile device to web server pass through the gateway. Two security protocols are used in between the wireless device and web server. one protocol named WTLS is used between the wireless device and gateway and other protocol named TLS is used between the gateway and web server. When two protocols are used in between the wireless device and web server then there is a problem of providing end to end security. Most of the research paper discuss about the wireless transport layer security for wireless device and transport layer security for wired device. This research paper suggested a Common security Protocol for wireless device and wired device. Instead of two different security protocols like WTLS and TLS, a common security protocol would be used in between the gateway. In this paper the architecture of common security protocol (CSP) is discussed. This paper focuses on comparative study of various security algorithms used for wireless device and wired device. On the basis of comparative analysis of both security protocols, algorithm would be designed for common security protocol. This algorithm for CSP would work in such way so that end to end security would be improved from wireless device to wired server.
Keywords :
Internet; computer network security; file servers; mobile computing; mobile radio; protocols; CSP; Internet connection; TLS protocol; WTLS protocol; Web server; algorithmic review; common security protocol; measure recommendation; mobile device; mobile phones; network gateway; wired device; wireless devices; wireless transport layer security; Communication system security; Logic gates; Security; Servers; Wireless application protocol; Architecture; Client; End to End Security; Server;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing Sciences (ICCS), 2012 International Conference on
Conference_Location :
Phagwara
Print_ISBN :
978-1-4673-2647-6
Type :
conf
DOI :
10.1109/ICCS.2012.11
Filename :
6391691
Link To Document :
بازگشت