25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

protection. For Web applications that employ st<strong>and</strong>ard Internet security<br />

techniques with TLS, the WAP gateway automatically <strong>and</strong> transparently<br />

manages wireless security with minimal processing costs. It provides end-to-end<br />

security <strong>and</strong> application-level security. This includes security facilities for<br />

encrypting <strong>and</strong> decrypting, strong authentication, integrity, <strong>and</strong> key management.<br />

WTLS complies with regulations about the use of cryptographic algorithms <strong>and</strong><br />

key lengths in different countries.<br />

WTLS employs special adapted mechanisms for the wireless environment, for<br />

example, long existing secure sessions, optimized h<strong>and</strong>shake procedures for the<br />

wireless network, <strong>and</strong> simple data reliability for operation over datagram bearers.<br />

Figure 18-21 shows the location of WTLS in the WAP architecture model <strong>and</strong> the<br />

internal WTLS architecture with its different WTLS protocols.<br />

WTLS<br />

H<strong>and</strong>shake<br />

Protocol<br />

Wireless Application Environment (WAE)<br />

Wireless Session Protocol (WSP)<br />

Wireless Transaction Protocol (WTP)<br />

Change Cipher<br />

Spec Protocol<br />

Record Protocol<br />

Alert<br />

Protocol<br />

Wireless Datagram Protocol (WDP/UDP)<br />

Bearer Networks<br />

Figure 18-21 WTLS within the WAP architecture <strong>and</strong> WTLS components<br />

Chapter 18. Wireless Application Protocol 697

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!