Abstract
Over the last decade there has been a rapid growth in the area of wireless applications. For a wireless application to be successful, it is essential to ensure that the transactions cannot be fraudulently generated, that transactions are legally binding, and that the confidentiality of private information is adequately protected. Such assurance depends upon deployment of public-key infrastructure (PKI) technology in wireless data networks. When wireless devices are used for data communication, they have to face many environmental limitations e.g. limited computing power in wireless devices, inadequate memory space, low network bandwidth and restriction imposed by underlying communication protocols and services. This obviously creates further challenges for protocol designers, implementers and standardization body. This paper discusses the issues involved in implementing PKI in wireless data networks and possible approaches to resolve them. It also provides an overview of today’s mobile system environment and current status of wireless security implementations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Singh, A.K.: E-Commerce Security. Proc. of National Seminar on E-Commerce & Web Enabled Applications at Harcourt Butler Technological Institute, Kanpur, India (2000)
Charles, Arehart et. al.: Professional WAP. Wrox Press Ltd. (2000)
Gilbert Held: NPN:The Wide World of Wireless. Network Magazine (December 1999)
Hasan, S., et. al.: Wireless Data Networks: Reaching the Extra Mile. IEEE Computer (December 1997)
Ramon, J., Hontanon: Encryption 101-The Choices. Sys Admin (1998)
Anita, Karve: PKI Options for Next Generation Security. Network Magazine (March 1999)
Fernandez, A.D.: Elliptic-Curve Cryptography. Dr. Dobb’s Journal (December 1999)
Epharaim, S.: Solutions on the Horizon will Relieve the Two-Zone Wireless Security Problem. InfoWorld.com (Nov. 2000)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Singh, A.K. (2001). Deployment of Public–Key Infrastructure in Wireless Data Networks. In: Networking — ICN 2001. ICN 2001. Lecture Notes in Computer Science, vol 2094. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47734-9_22
Download citation
DOI: https://doi.org/10.1007/3-540-47734-9_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42303-4
Online ISBN: 978-3-540-47734-1
eBook Packages: Springer Book Archive