Wireless IP and Its Challenges for the Heterogeneous Environment
Wireless Personal Communications: An International Journal
J2ME application-layer end-to-end security for m-commerce
Journal of Network and Computer Applications
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Alternative Schemes for Dynamic Secure VPN Deployment in UMTS
Wireless Personal Communications: An International Journal
An enterprise policy-based security protocol for protecting relational database network objects
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Proceedings of the 2006 international conference on Wireless communications and mobile computing
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Information Systems Security
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A mobile phone malicious software detection model with behavior checker
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Hi-index | 0.25 |
Internet-enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL on less capable CPUs and low-bandwidth wireless links. This article presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices. We have created new classes for the Java 2 Micro-Edition platform that offer fundamental cryptographic operations such as message digests and ciphers as well as higher level security protocols like SSL. Our results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within today's technological constraints