World Scientific
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

PERFORMANCE EVALUATION OF END-TO-END SECURITY IN WIRELESS APPLICATIONS USING WTLS HANDSHAKE PROTOCOL

    https://doi.org/10.1142/9781860947308_0021Cited by:0 (Source: Crossref)
    Abstract:

    In this paper we analyze the performance of end-to-end security in wireless applications. WTLS (Wireless Transport Layer Security) handshake protocol is used as the key security protocol. Several scenarios and different cryptosystems are considered. We took an experimental approach and implemented the protocols and necessary crypto primitives in both wireless handheld device and server. Tests are performed over a GSM provider network. Processing, queuing and transmission delays are considered in the analysis. Results are interpreted from both client and the server points of view. Not only the key sizes proposed by the WTLS standard, but also stronger key sizes are tested. Results show that (i) Elliptic Curve Cryptosystems (ECC) perform better than RSA cryptosystem, and (ii) it is possible to use ECC key sizes larger than the ones proposed in the WTLS standard without significant performance degradation. In our tests, GSM CSD and GPRS bearers are taken into account. Another interesting result is that the these two bearers perform close to each other in WTLS handshake protocol because of similar and significant traversal delays in both bearers.