2006
DOI: 10.1007/s11227-006-3549-4
|View full text |Cite
|
Sign up to set email alerts
|

Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security

Abstract: Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated to security layer of Wireless Application Protocol (WAP), is the Wireless Transport Layer Security (WTLS). In this paper, an efficient architecture for the hardware implementation of WTLS is proposed. The introduced system supports bulk encryption, authentication and data integrity. The proposed architecture operates alternatively for a set of ciphers, IDEA, DES, RSA, D.H., SHA-1 and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 33 publications
(81 reference statements)
0
6
0
Order By: Relevance
“…to the overestimation of security measures, which causes an unreasonable increase in the system load [24,25]. System's performance is especially important in environments with limited resources, including wireless sensor networks and mobile devices.…”
Section: Schneck Andmentioning
confidence: 99%
See 1 more Smart Citation
“…to the overestimation of security measures, which causes an unreasonable increase in the system load [24,25]. System's performance is especially important in environments with limited resources, including wireless sensor networks and mobile devices.…”
Section: Schneck Andmentioning
confidence: 99%
“…The latest results show [24,25] that in many cases the best way is to determine the required level of protection and then adjust security measures. (Among the means to meet these challenges one can indicate the security metrics [27].)…”
Section: Schneck Andmentioning
confidence: 99%
“…Until nowadays different hash functions have been adopted by wireless communications protocols and for networking data transmission: RIPEMD, SHA-1, SHA-2, TIGER, etc, coming to the forthcoming SHA-3 standard, by the end of the year [10][11][12][13][14][15].…”
Section: Hash Functions Design and Integrationmentioning
confidence: 99%
“…67 2017 2171 MD5 [11] 70 1653 442 SHA-1 [12] 70 1653 551 SHA-2 [13] 83 1060 291 BLAKE [14] 52 116,48 3017 HAVAL [15] 75 196 1708…”
Section: Ripemd [10]mentioning
confidence: 99%
“…The four Data Transformation Rounds are similar, but its one performs a different operation. MA components indicate modulo addition 232, while the shifters components define left shift rotations of the input data block [7]. The Data Transformation Round I operation is based on a Nonlinear Function i transformation of the three of BIn, CIn, and DIn, inputs.…”
Section: Unified Architecture Of Md-5 Sha-192mentioning
confidence: 99%