Skip to main content

An Novel Encryption Protocol for Mobile Data Synchronization Based on SyncML

  • Conference paper
Information Computing and Applications (ICICA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 105))

Included in the following conference series:

  • 1557 Accesses

Abstract

SyncML provides identity authentication service for the security of the data synchronization protocol at the server layer and database layer,. But the data is transmitted in cleartext XML after the authentication. These data are not encrypted and it is easy to be tapped. In order to enhance its security, this paper provides us a novel encryption data synchronization protocol which uses hierarchical encryption algorithms. Finally, an example is presented to illustrate this protocol and architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. DS Protocol. Approved Version 1.2.1 – 10 (August 2007)

    Google Scholar 

  2. Coron, J.-S.: Security & Privacy. IEEE 4(1), 70–73 (2006); Digital Object Identifier 10.1109/MSP.2006.29

    Google Scholar 

  3. Kerckhoff, A.: La Cryptographie Militaire. J.des Sciences Militaires 9, 5–38 (1983)

    Google Scholar 

  4. Tanenbaum, A.S.: Computer Networks. tsinghua university, Beijing (2004)

    MATH  Google Scholar 

  5. Rivest, R.L., Shamir, A., Adleman., L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM (1978)

    Google Scholar 

  6. Rivest, R.L.: The MD5 Message-Digest Algorithm. RFC 1321 (April 1992)

    Google Scholar 

  7. Yuval, G.: How to Swindle Rabin. Cryptologia 3, 187–190 (1979)

    Article  Google Scholar 

  8. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Berlin (2002)

    Book  MATH  Google Scholar 

  9. RFC1321: The MD5 message-digest algorithm (1992)

    Google Scholar 

  10. SyncML Synchronization Protocol, version 1.0 (2001)

    Google Scholar 

  11. Design of Data Synchronization Service System Based on SyncML/J2EE (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, C., Song, M., Liu, K., Xu, K. (2010). An Novel Encryption Protocol for Mobile Data Synchronization Based on SyncML. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds) Information Computing and Applications. ICICA 2010. Communications in Computer and Information Science, vol 105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16336-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16336-4_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16335-7

  • Online ISBN: 978-3-642-16336-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics