16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Security</strong> in Traditional <strong>Wireless</strong> Networks 385<br />

Client<br />

Server<br />

Client hello<br />

Server hello<br />

Server certificate*<br />

Server key exchange*<br />

Certificate request*<br />

Server hello done<br />

Client certificate*<br />

Client key exchange*<br />

Certificate verify*<br />

[Change cipher spec]<br />

Finished<br />

[Change cipher spec]<br />

Finished<br />

Application data<br />

Figure 17.9 : TLS in WAP<br />

17.3.2 Code <strong>Security</strong><br />

For most part, network security is concerned with transactional security on the network.<br />

In other words, we talk about securing the link(s) in the network using encryption,<br />

securing access to the network using authentication and so on. The merging of the<br />

GSM network with the Internet, however, adds another dimension to the concept of<br />

network security. The ME in a GPRS network can “ browse ” the Internet. In the Internet<br />

architecture, web servers sometimes download applets (short programs) on to the client<br />

(ME) over the network. These applets then execute at the client (ME). Consider what<br />

happens if the applet is a malicious piece of code or it simply has a bug which can harm<br />

the ME. To protect against such attacks, it is extremely important that the applets (or<br />

other programs which are downloaded from remote sites but execute on the client) be<br />

secure.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!