Page 171 - DCAP512_WAP_AND_WML
P. 171
Kumar Vishal, Lovely Professional University
Unit 12: Secure Application
Unit 12: Secure Application Notes
CONTENTS
Objectives
Introduction
12.1 Security Basics
12.1.1 Wireless Security Setup
12.2 WAP Security Architecture
12.2.1 Sample Configurations of WAP Technology
12.2.2 Comparison between WAP and Internet Protocol Layers
12.3 Session Management
12.3.1 Client Authentication
12.3.2 WML for Secure Applications
12.3.3 Cleaning Up
12.4 Summary
12.5 Keywords
12.6 Review Questions
12.7 Further Readings
Objectives
After studying this unit, you will be able to:
Scan security basics
Describe WAP security architecture
Demonstrate session management
Recognize WML for secure applications
Introduction
The WAP platform has leveraged the lessons from the development of other platforms, such as
the HTML browser, and it has built-in facilities to address security. The WAP platform provides
you with facilities at the transport level to ensure confidentiality and message integrity. The
Wireless Transport Layer Security (WTLS) provides security for the data exchanged directly
between the wireless device and the WAP gateway. In this unit we will WAP security basics and
architecture.
12.1 Security Basics
This intro to wireless networking setup and security is written with the assumption that the
reader has a basic understanding of wired networks, because in terms of protocol, wireless
works almost the same way. The difference is in the wireless component and associated hardware
configuration.
LOVELY PROFESSIONAL UNIVERSITY 165