wireless internet security full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#1
22-01-2010, 07:24 PM



.doc   Wireless Internet Security full report.doc (Size: 171 KB / Downloads: 391)
ABSTRACT
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL (Secure Sockets Layer) on less capable CPUs and low-bandwidth wireless links.
This report presents the experiences in implementing and using standard security mechanisms and proto-cols on small wireless devices. A new classes has been Java 2 Micro-Edition (J2ME„¢) plat-form that offer fundamental cryptographic operations such as message digests and ciphers as well as higher level security protocols like SSL. The results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within today™s technological constraints.

1. INTRODUCTION
In the past few years, there has been an explosive growth in the popularity and availability of small, handheld devices (mobile phones, PDAs, pagers), that can wirelessly connect to the Internet. These devices are predicted to soon outnumber traditional Internet hosts like PCs and workstations [1]. With their convenient form factor and falling prices, these devices hold the promise of ubiquitous (anytime, anywhere) access to a wide array of interesting services. However, these batterydriven devices are characterized by limited storage (volatile and non-volatile memory), minimal computational capability, and screen sizes that vary from small to very small. These limitations make the task of creating secure, useful applications for these devices especially challenging.
It is easy to imagine a world in which people rely on connected handheld devices not only to store their personal data, check news and weather reports, but also for more security sensitive applications like on-line banking, stock trading and shopping - all while being mobile. Such transactions invariably require the exchange of private information like passwords, PINs and credit card numbers and ensuring their secure transport through the network becomes an important concern.
On the wired Internet, Secure Sockets Layer (SSL) [3] is the most widely used security protocol.Between its conception at Netscape in the mid-90s and standardization within the IETF in the late-90s, the protocol and its implementations have been subjected to careful scrutiny by some of the worldâ„¢s foremost security experts [5]. No wonder then, that SSL (in the form of HTTPS which is simply HTTP over SSL) is trusted to secure transactions for sensitive applications ranging from web banking to securities trading to e-commerce. One could easily argue that without SSL, there would be no e-commerce on the web today. Almost all web servers on the Internet support some version of SSL [6]. Unfortunately, none of the popular wide-area wireless data services today offer this protocol on a handheld device. Driven by perceived inadequacies of SSL in a resource constrained environment, architects of both WAP [7] and Palm.net [8] chose a different (and incompatible) security protocol (e.g., WTLS[9] for WAP) for their mobile clients and inserted a proxy/gateway in their architecture to perform protocol conversions. A WAP gateway, for instance, decrypts encrypted data sent by a WAP phone using WTLS and re-encrypts it using SSL before forwarding it to the eventual destination server. The reverse process is used for traffic flowing in the opposite direction.
Such a proxy-based architecture has some serious drawbacks. The proxy is not only a potential performance bottleneck, but also represents a man-in-the-middle which is privy to all secure communications. This lack of end-to-end security is a serious deterrent for any organization thinking of extending a security-sensitive Internet-based service to wireless users. Banks and brokerage houses are uncomfortable with the notion that the security of their customersâ„¢ wireless transactions depends on the integrity of the proxy under the control of an untrusted third party [10].
We found it interesting that the architects of WAP and Palm.net made tacit assumptions about the unsuitability of standard Internet protocols (especially SSL) for mobile devices without citing any studies that would warrant such a conclusion [11]. This prompted our experiments in evaluating standard security algorithms and protocols (considered too big by some) for small devices. We sought answers to some key questions: Is it possible to develop a usable implementation of SSL for a mobile device and thereby provide end-to-end security How would near-term technology trends impact the conclusions of our investigation
The rest of this report describes our experiments in greater detail. Section 2 reviews the security architecture of current wireless Internet offerings and analyses its shortcomings. Section 3 provides an overview of the SSL protocol. In particular, we highlight aspects that make it easier to implement SSL on weak CPUs than it might appear at first. Section 4 discusses our implementation of an SSL client, called KSSL, on a Palm PDA and evaluates its performance. Section 5 describes an application weâ„¢ve developed for secure, mobile access to enterprise resources through sun. netTM based on KSSL. Section 6 talks about mobile technology trends relevant to application and protocol developers. Finally, we offer our conclusions in Section 7.

2. BACKGROUND
As wireless data services evolve, their architects are faced with two choices that can profoundly impact the future of the wireless Internet. They can adopt (if necessary, adapt) standard Internet protocols or create an entirely different set of standards applicable only in the wireless world.The former choice would seamlessly extend the Internet to future mobile devices, the latter could severely stunt its expansion.
The Wireless Application Protocol (WAP) Forum subscribed to the wireless is different philosophy for its WAP 1.0 specification which defines an entire suite of protocols that parallel standard TCP/IP and web protocols, but are incompatible with them [12]. In contrast, others like the IETFâ„¢s PILC working group [13] have put forth proposals to re-use existing protocols and standards in ways that accommodate the special characteristics of wireless networks without destroying compatibility (see also [14, 15]).
2.1 Proxy Based Architecture

Due to protocol incompatibilities, a WAP device cannot communicate directly with the large installed base of Internet hosts. Instead, all communication must go through a gateway or proxy that performs protocol (and possibly content) translation. In typical deployments of WAP, this proxy is owned and maintained by a wireless service provider, who pre-programs the proxy in all of its customersâ„¢ phones. This allows the service provider to control what parts of the Internet are accessible to its customers thereby creating a walled garden [16].
These architectural choices raise a number of concerns.
1. Scalability: Since a proxy must process data packets to and from a large number of mobile devices, it represents a potential performance bottleneck (besides being a single point of failure). The insertion of a proxy also precludes end-to-end flow control. Since the wired side of a proxy has greater bandwidth than its wireless side, the proxy needs to maintain large data buffers for each active data flow.
2. Legal: A recent French court ruling, prohibiting French Telecom from dictating which gateways its customers could use, is an indication that such an approach may have legal and anti-trust implications[17].
3. Security: The most glaring drawback of a proxied architecture is the lack of end-to-end security. In the process of decrypting and re-encrypting traffic, the proxy gets to see all communication in the clear3. This WAP gap problem is depicted in Figure 1 ” even though the wired and wireless hops are encrypted, the proxy is privy to all information exchanged. Sometimes the situation is even worse, as weak encryption (or none at all) is used on the wireless side giving mobile users a false sense of security.
This problem is not unique to WAP. The Palm.net security architecture uses a proprietary protocol based on Elliptic Curve Cryptography (ECC) [18] between the wireless device and the Palm.net proxy (owned and operated by Palm). SSL is used only between the proxy and the eventual destination. Thus, when a Palm VII user accesses an HTTPS URL to establish a secure connection with a webserver, the connection that is set up isnâ„¢t truly secure.This is unacceptable to security savvy organizations, e.g., Sunâ„¢s corporate firewall explicitly disallows connection attempts from the Palm.net proxy.
2.2 End-to-end Architecture

In contrast, the use of SSL between desktop PCs/workstations and Internet servers offers end-toend security (Figure 2). This holds true even when an HTTPS proxy is used to traverse firewalls.Unlike the WAP or Palm.net proxy, an HTTPS proxy does not perform decryption/re-encryptionof data. Rather, it acts as a simple TCP relay shuttling encrypted bytes from one side to the other without modification.
The expression old is gold is especially apt when considering security protocols. Very often, it takes years of widespread public review and multiple iterations [19, 20] to discover and correct subtle but fatal errors in the design and/or implementation of a security protocol. After more than five years of public scrutiny and deployment experience4, SSL is the most widely trusted security protocol for all sorts of web-based transactions. The addition of SSL capabilities to mobile devices would bring the same level of security to the wireless world.
3 SECURE SOCKETS LAYER (SSL)
3.1 Overview
SSL provides encryption, source authentication and integrity protection of application data over insecure, public networks. The protocol requires a reliable, bi-directional, byte-stream service.Typically, this service is provided by TCP which guarantees that there is no duplication, loss, or reordering of bytes.
As shown in Figure 3, SSL is a layered protocol. The Record layer sits above the underlying transport and provides bulk encryption and authentication services using symmetric key algorithms. The keys for these algorithms are established by the Handshake protocol which uses public-key algorithms to create a master secret between the SSL client and server. This master secret is further used to derive cipher keys, initialization vectors and MAC (Message Authentication Code) keys for use by the Record Layer. Until these keys are installed, the Record Layer acts as a simple bi-directional pass through for all data. Conceptually, the Alert protocol and the Change Cipher Spec protocol sit within the same layer as the Handshake protocol. The former is used for notification of any protocol failures. The latter is used to signal successful completion of the handshake and the start of bulk encryption and authentication in an SSL stream.
SSL is very flexible and can accommodate a variety of algorithms for key agreement (RSA, DH, etc.), encryption (RC4, 3DES, etc.), and hashing (MD5, SHA, etc.). To guard against adverse interactions (from a security perspective) between arbitrary combinations of these algorithms, the standard specification explicitly lists combinations of these algorithms, called cipher-suites, with well-understood security properties.

The Handshake protocol is the most complex part of SSL with many possible variations (Figure 4). In the following subsection, we focus on its most popular form, which uses RSA key exchange and does not involve client-side authentication. The SSL protocol allows both clientand server-side authentication. However, due to the unwieldy problem of maintaining client-side certificates, only the server is typically authenticated. Client authentication, in such cases, happens at the application layer above SSL, e.g., through the use of passwords (one-time or otherwise) sent over an SSL-protected channel. The serverâ„¢s CertificateRequest message, as well as the clientâ„¢shutdown Certificate and CertificateVerify messages shown in Figure 4, are only needed for client-side authentication and rarely encountered in practice.
3.1.1 Full SSL Handshake
The client initiates a new SSL session by sending a ClientHello message which contains a random number (used for replay protection), a session ID (set to zero), and a set of upported cipher-suites.
If the server is unwilling to support any of the proposed cipher suites, it aborts the handshake and issues a failure notification. Otherwise, it generates a random number and a session ID and sends them in the ServerHello message along with the selected cipher suite. The ServerHello is followed by a Certificate message containing the serverâ„¢s RSA public-key in an X.509 certifi-cate5. If this key is unsuitable for generating the clientKeyExchange message (e.g., if the key is authorized for signing but not for encryption), the server includes another RSA public key in the ServerKeyExchange message and signs it with the private key corresponding to its certified public key.
The client verifies the serverâ„¢s public key. It then generates a 48-byte random number, called the pre-master secret, and encrypts it with the serverâ„¢s public key. The result is sent to the server in the ClientKeyExchange message. The client also computes a master-secret based on the premaster secret and the client and server random numbers exchanged previously. The master key is

processed further to derive the symmetric keys used for bulk encryption and authentication. These keys are installed in the record layer and a ChangeCipherSpec message is sent to signal the end of in-the-clear communication. The Finished message is the first one from the client side to be secured by the negotiated cipher suite. It ensures that any tampering of prior handshake messages, sent in-the-clear, can be detected.
Upon receiving the ClientKeyExchange message, the server decrypts the pre-master secret and follows the same steps as the client to derive the master secret and symmetric keys for the Record Layer. After installing these keys in the Record Layer, the server is able to validate the clientâ„¢s Finished message. The server also sends the changeCipherSpec and Finished messages to complete the handshake.
From here on, application data can be exchanged and it is protected by the encryption/hashing algorithms negotiated in the handshake. Each direction of the trafficâ„¢s flow uses distinct encryption and MAC keys.
3.1.2 Abbreviated SSL HandShake
The SSL specification also supports a feature called session reuse which allows the client and server to reuse the master key derived in a previous session. The abbreviated handshake protocol is shown in Figure 5. Here, the ClientHello message includes the non-zero ID of a previously negotiated session. If the server still has that session information cached and is willing to reuse the corresponding master secret, it echoes the session ID in the ServerHello message. Otherwise, it returns a new session ID thereby signaling the client to engage in a full-handshake. The derivation of symmetric keys from the master secret and the exchange of ChangeCipherSpec and Finished messages is identical to the full handshake scenario.

The abbreviated handshake does not involve certificates or public-key cryptographic operation so fewer (and shorter) messages are exchanged. Consequently, an abbreviated handshake is significantly faster than a full handshake.
3.2 SSL on Small Devices: Common Perception v/s Informed Analysis
SSL is commonly perceived as being too heavyweight for comparatively weaker CPUs and low bandwidth, high latency wireless networks. The need for RSA operations in the handshake, the verbosity of X.509 encoding, the chattiness (multiple round trips) of the handshake protocol and the large size of existing SSL implementations are all sources of concern and contribute to the perception that SSL is too big for small devices. However, we are not aware of any empirical studies evaluating SSL for small devices and a careful analysis of the protocolâ„¢s most common usage reveals some interesting insights:
Some constraints ease others. If the network is slow, the CPU doesnâ„¢t need to be very fast to perform bulk encryption and authentication at network speeds.
A typical SSL client only needs to perform RSA public-key, rather than private-key, operations for signature verification and encryption. Their small exponents (typically no more than 65537, a 17-bit value) make public-key operations much faster than private-key operations.It is worth pointing out that the performance of RSA public-key operations is comparable to that of equivalent Elliptic Curve Cryptography operations [21, 22].
There are several opportunities to amortize the cost of expensive operations across multiple user transactions. Most often, a client communicates with the same server multiple times over a short period of time, e.g., such interaction is typical of a portal environment. In this scenario, SSLâ„¢s session reuse feature greatly reduces the need to perform public-key RSA operations.
Although SSL can be used to secure any connection-oriented application protocol (SMTP, NNTP, IMAP), it is used most often for securing HTTP. The HTTP 1.1 specification encourages multiple HTTP transactions to reuse the same TCP connection. Since an SSL handshake is only needed immediately after TCP connection set up, this persistent HTTP feature further decreases the frequency of SSL handshakes.

4. KSSL and KSecurity

KiloByte SSL (KSSL), is a small footprint, SSL client for the Mobile Information Device Profile (MIDP)[23] of J2METM [24]. Its overall architecture and relationship to the base J2ME platform is depicted in Figure 6.
The KSecurity package provides basic cryptographic functions such as random number generation, encryption, and hashing that are missing from base J2ME. It reuses the Java CardTM API [25] which opens up the possibility of using a Java Card as a hardware crypto accelerator with minimal changes to the KSSL code. Some of the compute intensive operations (like modular exponentiation of large integers) are implemented as native methods in C. The native code was based on a public domain PalmOS port [27] of the crypto portions of OpenSSL [28].
An SSL client also needs to process X.509 certificates and maintain a list of trusted certificate authorities. Since the Java Card APIs do not deal with Certificates or KeyStores, we modeled these classes as subsets of their Java 2 Standard Edition (J2SE)TM counterparts. The KSecurity APIs are labeled © in Figure 6. The SSL protocol (represented by the box labeled KSSL in Figure 6) is written purely in JavaTM and its functionality can be accessed through the J2ME Connector API (labeled (a) in Figure 6). The Connector API works with URLs (even serial I/O is represented this way) and the addition of KSSL allows us to support HTTPS URLs in addition to HTTP URLs. We also provide another simple, but not yet standardized, API (b) which offers applications greater control over the SSL protocol, e.g., the ability to seek user input upon encountering problematic certificates.
4.1 Supported Features
The following is a list of features offered by the KSecurity and KSSL packages:
Keys: Symmetric keys of different lengths and RSA Public/Private keys with modulus lengths up to and including 1024-bits.
Ciphers: RSA (for key exchange) and RC4 (for bulk encryption). DES code is available but no longer included by default.
Message Digests: MD5 and SHA.
Signatures: RSA with both MD5 and SHA (as described in PKCS#1).
Certificates: Only X.509 certificates containing RSA keys and signed using RSA with MD5 or SHA are supported. X.509v3 extensions are handled correctly “ subjectAltName, basic Constraints, keyUsage and extendedKeyUsage are recognized. Unrecognized extensions that are marked as critical result in an error notification.
KeyStore: Only supports certificate storage (currently, private keys or symmetric keys cannot be stored).
SSL: KSSL is a client-side only implementation of SSLv3.0 Other versions, SSLv2.0 or SSLv3.1 (aka TLS1.0) are not currently supported since they are not used as frequently. The client only offers two cipher suites “ RSA RC4 128 MD5 and RSA RC4 40 MD5 since they are fast and almost universally implemented by SSL servers from the very early days of the protocol. Client-side authentication is not implemented because it is rarely used and requires (highly CPU intensive) private-key RSA operations on the client. The server is authenticated via RSA signatures. There are no restrictions on the server™s certificate chain length. The client maintains an extensible set of trusted Certification Authorities. The SSL client supports session reuse, works on J2ME running on PalmOS, Solaris andWindows, and inter-operates with SSL servers from iPlanet, Microsoft, Sun and Apache (using OpenSSL).
4.2 Performance
Memory Requirements: For PalmOS [26], the addition of KSSL and KSecurity classes increases the size of the base J2ME implementation by about 90 KBytes. This additional memory is reasonable compared to the size of base J2ME which is typically a few hundred KBytes. It is possible to reduce the combined size of KSSL and KSecurity packages to as little as 70 KByte if one is willing to sacrifice the clean interface between them (applications will only be able to access security services through SSL).
Bulk encryption and authentication We found that the bulk encryption and authentication algorithms are adequately fast even on the Palmâ„¢s CPU. On a 20Mhz chip (found in Palm Vx, Palm IIIc, etc.), RC4, MD5, and SHA all run at over 100Kbits/s, Since each SSL record requires both a MAC computation and encryption, the effective speed of bulk transfer protected by RC4/MD5 is around 50Kbits/s, far more than the 9.6Kbits/s bandwidth offered by our Omnisky CDPD network service.

SSL Handshake Latency A typical handshake requires two RSA public-key operations: one for certificate verification and another for pre-master secret encryption. Depending on the key size (768 bits or 1024 bits), our implementation of RSA takes 0.5-1.5 seconds on a 20MHz Palm CPU. Other factors such as network delays and the time to parse X.509 certificates also impact the handshake latency. In our experiments with Palm MIDP on a CDPD network, we found that a full handshake can take around 10-13 seconds. While this is unacceptable for random web browsing, targeted mobile applications such as those for banking or secure remote access tend to communicate with the same SSL server repeatedly over a small duration. In such cases, the handshake overhead can be reduced dramatically. For example, simply caching the server certificate (indexed by an MD5 hash) eliminates the overhead of certificate parsing and verification. This brings down the latency of a subsequent full handshake to 7-8 seconds. An abbreviated handshake only takes around 2 seconds. Finally, by using persistent HTTP, one make the amortized cost of an SSL handshake arbitrarily close to zero.
5. SECURE MOBILE ENTERPRISE ACCESS

To evaluate usability of the KSecurity and KSSL packages for real-world applications, we have developed a J2ME midlet suite (a MIDP application is called a midlet) that enables Sun employees to securely access enterprise services like corporate email, calendar and directory from a PalmVx connected to the Internet via Omniskyâ„¢s wireless CDPD modem. The application size is about 55 KB and it runs in 64 KB of application heap.
The overall architecture (shown in Fig. 7) reuses Sunâ„¢s existing SSL-based virtual private network (VPN) for remote employees, also known as sun.net, which is based on the iPlanet Portal Server. All communication between the VPN gateway and the mobile device is protected end-to-end by SSL. Remote users must authenticate themselves through a challenge-response mechanism (using token cards) over an SSL-secured channel before they can access the Intranet. Authenticated users are allowed to communicate with specially designed servlets running on a web server behind the firewall. The main purpose of these servlets is to format data obtained from mail, calendar or LDAP servers for consumption by the remote application. The servlets are capable of maintaining session-specific state. This allows for features such as chunking where a long email message is sent to the user in smaller parts for bandwidth efficiency (this avoids sending any long messages in which the user has no interest).
By making effective use of certificate caching and SSL session reuse, we are able to reduce the response time of each user transaction to about 8 seconds which is comparable to the response time of accessing public web pages in the clear. For now, the persistent HTTP feature has not been turned on at the VPN gateway. Exploiting this feature would reduce the response time to around seconds.

6. TECHNOLOGY TRENDS
Since starting this project and implimentation about an year ago, weâ„¢ve seen several examples of technologyâ„¢s relentless march towards smaller, faster and more capable devices. Newer Palm PDAs like the PalmVx and PalmIIIc use 20MHz processors and the Handspring Visor Platinum (another PalmOS device) features a 33MHz processor, both considerable improvements over the earlier 16MHz CPUs. All of them offer 8MB of memory. The Compaq iPaQ pocket PC [30], in comparison, carries a 200MHz StrongARM processor and 16-32MB of memory. The CPU enhancements have a direct impact on the speed of SSLâ„¢s cryptographic operations. Significant performance gains are also obtainable by using hardware accelerators in the form of tiny smart cards (and related devices like the iButton [31]). The Schlumberger Cyberflex smart card [32], for instance, can perform 024-bit RSA operations (both public- and private-key) in under one second.
Similarly, improvements can also be seen in the speed of wireless networks. Metricomâ„¢s Ricochet service [33] now offers wireless data speeds of 128Kbits/s in several U.S. cities and 3G networks hold the promise of even faster communication in the next year or two. These improvements help reduce the network-related latency of an SSL handshake. Even with the older 32Kbits/shutdown Ricochet service, we see 15-20Powerful handhelds like the iPaQ using 802.11 for wireless connectivity have no problems whatsoever running SSL.
Even smart compilation techniques, which had so far been available only on more capable PCs and workstations, are now available on small devices and can boost the performance of J2ME applications by as much as a factor of five [34, 35]. These developments should alleviate any remaining concerns about SSLâ„¢s suitability for wireless devices. They also highlight an interesting phenomenon: In the time it takes to develop and deploy new (incompatible) protocols, technology constraints can change enough to raise serious questions about their long-term relevance. The following quote captures this sentiment rather well:
Don™t skate to the puck; skate to where it™s going. ” Wayne Gretzsky (Ice HockeyLegend) In light of this view, it is reassuring to see the WAP Forum embracing standard IETF and W3C protocols for its next (WAP 2.0) specification.

7. CONCLUSIONS AND FUTURE WORK
The experiments show that SSL is a viable technology even for todayâ„¢s mobile devices and wireless networks. By carefully selecting and implementing a subset of the protocolâ„¢s many features, it is possible to ensure acceptable performance and compatibility with a large installed base of secure web servers while maintaining a small memory footprint.
The implementation brings mainstream security mechanisms, trusted on the wired internet, to wireless devices for the first time. The use of standard SSL ensures end-to-end security, an important feature missing from current wireless architectures. The latest version of J2ME MIDP incorporating KSSL can be downloaded from [23].

8. REFERENCES
[1] IDC, IDC Envisions a Time When Majority of Internet Access Will Be Through wireless Devices, see idc.com:8080/communications/press/pr/CM0 41000pr.stm
[2] Certicomâ„¢s Secure Memopad Application, see palmgearsoftware
[3] Frier, A., Karlton, P., Kocher, P., The SSL3.0 Protocol Version 3.0, see home.netscapeeng/ssl3/
[4] Dierks, T., Allen, C., The TLS Protocol Version 1.0 see ietfrfc/rfc2246.txt
[5] Wagner, D. and Schneier, B., Analysis of the SSL 3.0 protocol, 2nd USEN IX Workshop on Electronic Commerce, 1996. Available from cs.berk ley.edu/Ëdaw/papers/.
[6] Murray, E., SSL Server Security Survey, see lneericm/papers/ssl server stats.html
[7] The Wireless Application Protocol Forum, see wapforum
[8] Palm, Inc., The Palm.Net Wireless Communication Service, see palmproducts/palmvii/wireless.html
[9] WAP Forum, Wireless Transport Layer Security Specification, see wapforumwhat/technical. Htm
[10] Cobb, S., Dealing with WAP-gap security risks, see serverworldmagazinesunserver/2001/01/wapgap.shtml
[11] Miranzadeh, T., Understanding Security on the Wireless Internet, see tdap.co.uk/uk/archive/billing/bill(phonecom 9912).html
[12] Khare, R., W* Effect Considered Harmful, see 4k-associatesIEEE-L7-WAP-BIG.html, Apr. 1999.
[13] IETF Working Group on Performance Implications of Link Characteristics (PILC), see ietfhtml.charters/pilc-charter.html.
[14] Blake-Wilson, S., Dierks, T., ECC Cipher Suites for TLS, Internet draft <draft-ietf-tls-ecc-01.txt>, work in progress, Mar. 2001.
[15] World Wide Web Consortium, XHTML Basic, see w3cTR/xhtml-basic/
[16] Mitzel, D., Overview of 2000 IAB Wireless Internetworking Workshop, Internet draft<draft-iab-wirelessws-00.txt>, Jun. 2000.
[17] Bradner, S., The problems with closed gardens, Network World, Jun 12, 2000, at nwfusion. com/columnists/2000/0612bradner.html
[18] Koblitz, N., A Course in Number Theory and Cryptography 2nd Edition, Springer-Verlag.
[19] Needham, R. M. and Schroeder, M. D., Using Encryption for Authentication in Large Networks of Computers, Communications of the ACM, vol. 21, no. 12, Dec 1978, pp. 993“999.
[20] Needham, R. M. and Schroeder, M. D., Authentication Revisited, Operating System Review, vol. 21, no. 1, Apr 1990, pp. 35“38.
[21] Boneh, D. and Daswani, N., Experiments with Electronic Commerce on the PalmPilot, Financial Cryptography ˜99, Lecture Notes in Computer Science, vol. 1648, 1999, pp. 1“16.
[22] Wiener, M., Performance Comparison of Public-Key Cryptosystems, CryptoBytes vol. 4,no. 1, 1998.
[23] Mobile Information Device Profile (MIDP), see java.sunproducts/midp
[24] Java 2 Micro Edition, see java.sunj2me/
[25] Java Card Technology, see java.sunjavacard/
[26] Palm Computing Inc., palm.


ACKNOWLEDGEMENT
I express my sincere gratitude to Dr. Agnisarman Namboodiri, Head of Department of Information Technology and Computer Science , for his guidance and support to shape this paper in a systematic way.
I am also greatly indebted to Mr. Saheer H. and
Ms. S.S. Deepa, Department of IT for their valuable suggestions in the preparation of the paper.
In addition I would like to thank all staff members of IT department and all my friends of S7 IT for their suggestions and constrictive criticism.

CONTENTS
1. INTRODUCTION 1
2. BACKGROUND 4
Proxy Based Architecture 4
End-to-end Architecture 6
3. SECURE SOCKETS LAYER (SSL) 7
Overview 7
SSL on Small Devices 11
4. KSSL and KSecurity 13
Supported Features 14
Performance 15
5. SECURE MOBILE ENTERPRISE ACCESS 17
6. TECHNOLOGY TRENDS 19
7. CONCLUSIONS AND FUTURE WORK 21
8. REFERENCES 22
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#2
26-01-2012, 10:46 AM


to get information about the topic Data Security In Wireless Networks full report,ppt and related topic refer the link bellow

topicideashow-to-data-security-in-wireless-networks-download-semianr-report

topicideashow-to-wireless-network-security

topicideashow-to-wireless-lan-security-seminar and presentation-report

topicideashow-to-wireless-internet-security-full-report

topicideashow-to-secure-wireless-data-communication

topicideashow-to-network-security-project and implimentations

topicideashow-to-border-security-using-wireless-integrated-network-sensors-wins

topicideashow-to-security-in-ad-hoc-wireless-networks-full-report
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM seminar surveyer 8 6,654 04-01-2016, 11:40 PM
Last Post: Neha_mohan
  Report on Internet study tips 0 634 28-08-2013, 04:21 PM
Last Post: study tips
  Biometric Security Palm Vein Technology project uploader 2 1,458 19-08-2013, 09:55 AM
Last Post: study tips
  Full Report on Cloud computing study tips 4 1,287 02-08-2013, 09:59 AM
Last Post: study tips
  ENHANCING MINE SAFETY WITH WIRELESS SENSOR NETWORKS USING ZIGBEE TECHNOLOGY pdf study tips 0 637 01-07-2013, 04:43 PM
Last Post: study tips
  A Paper Presentation On WIRELESS TECHNOLOGY study tips 0 651 22-05-2013, 12:59 PM
Last Post: study tips
  5G Technology – Redefining wireless Communication in upcoming years study tips 0 952 04-05-2013, 04:54 PM
Last Post: study tips
  SEMINAR REPORT ON Wireless LAN-IEEE 802.11 study tips 0 736 25-02-2013, 10:43 AM
Last Post: study tips
  Wireless hand gesture controlled bot Report study tips 0 673 14-02-2013, 12:44 PM
Last Post: study tips
  INFORMATION SECURITY USING STEGANOGRAPHY ppt seminar tips 0 864 07-02-2013, 04:20 PM
Last Post: seminar tips