Security for a Connectionless Peer-to-Peer Link

  • Graeme Proudler
  • Iris Harvey


This article describes a protocol designed to secure a connectionless communication channel between a mobile computer and a server. Specifically, the protocol checks that all messages have been delivered in the correct order to the correct destination, and a received message is the message that was sent.

The protocol provides automatic authentication, integrity, and confidentiality on a communication link between two peers, specifically a mobile computer and a server. The protocol is simplified by the fact that key distribution is almost a null process because only two entities are involved, and those entities can at times communicate in a secure environment. A prototype is being built using a laptop PC with mobile phone as the mobile and a PC with modem as the server.

Naturally, the protocol is also applicable to connection-oriented channels.


Sequence Number Replay Attack Security Layer Mobile Computer Security Process 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    ITU, Directory - authentication framework, Recommendation X.509. Google Scholar
  2. 2.
    Bruce Schneier. Applied Cryptography,Wiley, second edition (1996).Google Scholar

Copyright information

© Springer Science+Business Media New York 1997

Authors and Affiliations

  • Graeme Proudler
    • 1
  • Iris Harvey
    • 2
  1. 1.Hewlett Packard Laboratories BristolStoke Gifford, BristolUK
  2. 2.University of the West of EnglandFrenchay, BristolUK

Personalised recommendations