SlideShare a Scribd company logo
1 of 22
A Power point Presentation on
WAP Security
Overview
• Security Basics
• Wireless Security
• WTLS & SSL
• WAP Security Models
• WIM, WMLScript, Access Control
• Summary
• References
Security Basics
• Security Goals
– Authentication
– Confidentiality
– Integrity
– Authorization
– Non-Repudiation
Security Basics
• Cryptography
– Symmetric: 3DES, RC4, etc.
– Asymmetric: RSA, ECC
• Key Exchange
• Digital Signature
• Certificates
• PKI
Wireless Security
• Link Layer Security
– GSM
– CDMA
– CDPD
• Application Layer Security
– WAP: WTLS, WML, WMLScript, & SSL
– iMode: N/A
– SMS: N/A
Need for App Level Security
• Bearer
Independence
• Security out to Gateway
• Advanced Security Goals
(ie. Non-Repudiation)
Basic WAP Architecture
Internet
Gateway
Web Server
WTLS SSL
WAP Security Models
• Operator Hosts Gateway
– Without PKI
– With PKI
• Content Provider Hosts Gateway
– Static Gateway Connection
– Dynamic Gateway Connection
Operator Hosts Gateway
• Without PKI
Internet
WAP/HDTP
Gateway
Web Server
WTLS Class 1 or Encrypted HDTP SSL
Operator
Content
Provider
Operator Hosts Gateway
• Without PKI:
– Advantages
• No extra work for Content Provider
• No extra work for user
• System only requires one logical gateway
– Disadvantages
• Content Provider must trust Operator (NDA)
• Operator can control home deck
• Operator can introduce advertising
Operator Hosts Gateway
• With PKI
Operator Hosts Gateway
• With PKI:
– Advantages
• Content providers does not need to
trust Operator.
– Disadvantages
• PKI Infrastructure must be in place.
Content Provider Hosts Gateway
• Static Gateway Connection
WAP
Gateway
Web Server
WTLS Class 2
SSL
Content
Provider
Content Provider Hosts Gateway
• Static Gateway Connection
– Advantages
• Content Provider does not need to trust
Operator
• Content Provider can control home deck
• OTA can be used to configure mobile terminal
– Disadvantages
• Mobile terminal may have limited number of
gateway config sets (i.e., Nokia 7110 has 10)
• Mobile Terminal needs to be configured.
– OTA via WAP Push / SMS may not work with
gateway / mobile terminal combination
– Content Provider may have to pre-configure
mobile terminals
Content Provider Hosts Gateway
• Dynamic Gateway Connection
Internet
WAP
Gateway
WTLS Class 2 SSL
Operator
Web
Server
SSL
Content
Provider
WAP
Gateway
Content Provider Hosts Gateway
• Dynamic Gateway Connection
– Advantages
• Content Provider does not need to trust
Operator.
• Content Provider does not need to
worry about mobile terminal config
– Disadvantages
• Operator needs to trust Content
Provider.
• Not deployed yet.
Restricting Gateway Access
• Consider the following attack:
– Eve runs a “modified” WAP gateway
– Eve fools a user into using her gateway
• Now, Eve can eavesdrop on all of the
users requests and responses!
• To prevent this, check the gateway IP
address in the HTTP request.
WIM: WAP Identity Module
• WIM must be tamper-resistant
• Stores Keys & Master Secrets
• Computes crypto operations
– “unwrapping master secret”
– client signature in WTLS Handshake
– key exchange (ECC WTLS Handshake)
• Also:
– Generates Keys
– Stores Certificates (or their URLs)
• CA & Root Certs
• User Certs
• Can be implemented with SIM
WMLScript Crypto API
• Non-repudiation
• signedString = Crypto.signText
(stringToSign, options, keyIdType,
keyId)
• Uses a separate, distinct signing key
• WIM can store signing key and
compute signature
WML Access Control
• WML Deck-Level Access Control
<wml>
<head>
<access domain=“worldfaq.com” path = “/stats”>
</head>
<card>
…
</card>
</wml>
• WMLScript Access Control
use access
domain domain_name |
path path_name |
domain domain_name path path_name;
• use access domain “worldfaq.com” path “/stats”
Summary
• Gateway position & configuration
allows for different trust models
• Security at multiple levels
– Link Layer (depends on bearer)
– App Layer
• Authentication,
Confidentiality, and
Integrity: WTLS
• Authorization: App-dependent, or WML
<access> and WMLScript use access pragma
• Non-Repudiation: WML signText
References
• C. Arehart, N. Chidambaram, S. Guruprasad, et. al.
Professional WAP. Wrox Press, 2000. ISBN 1-861004-0-44
• D. Margrave, GSM Security and Encryption
• WAP-100, Wireless Application Protocol Architecture
Specification
• WAP-191, Wireless Markup Language Specification
• WAP-193, WMLScript Language Specification
• WAP-199, Wireless Transport Layer Security Specification
• WAP-198, Wireless Identity Module
• WAP-161, WMLScript Crypto API Library
• WAP-187, WAP Transport Layer E2E Security Specification
• WAP-217, WAP Public Key Infrastructure Definition

More Related Content

What's hot

16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy conceptMostafa El Lathy
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotServicePilot
 
Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3Alexandra N. Martinez
 
Webservice security considerations and measures
Webservice security considerations and measuresWebservice security considerations and measures
Webservice security considerations and measuresMaarten Smeets
 
Application Monitoring with WSO2 App Server
Application Monitoring with WSO2 App ServerApplication Monitoring with WSO2 App Server
Application Monitoring with WSO2 App ServerSagara Gunathunga
 
Dangerous Demo: Apidaze
Dangerous Demo: ApidazeDangerous Demo: Apidaze
Dangerous Demo: ApidazeAlan Quayle
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudflare
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering conceptMostafa El Lathy
 

What's hot (15)

Proxy server
Proxy serverProxy server
Proxy server
 
Cloudron bay lisa-presentation
Cloudron bay lisa-presentationCloudron bay lisa-presentation
Cloudron bay lisa-presentation
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3
 
Webservice security considerations and measures
Webservice security considerations and measuresWebservice security considerations and measures
Webservice security considerations and measures
 
WSO2 Application Server
WSO2 Application ServerWSO2 Application Server
WSO2 Application Server
 
Application Monitoring with WSO2 App Server
Application Monitoring with WSO2 App ServerApplication Monitoring with WSO2 App Server
Application Monitoring with WSO2 App Server
 
K8s Webhook Admission
K8s Webhook AdmissionK8s Webhook Admission
K8s Webhook Admission
 
Dangerous Demo: Apidaze
Dangerous Demo: ApidazeDangerous Demo: Apidaze
Dangerous Demo: Apidaze
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - Webinar
 
Access control
Access controlAccess control
Access control
 
Proxy
ProxyProxy
Proxy
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
 

Similar to Wap wml-6

Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch PresentationRam Dutt Shukla
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngVõ Thái Lâm
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngSecurity Bootcamp
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudNeelkamal Gaharwar
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.pptSonukumarRawat
 
The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)Channy Yun
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionAnant Shrivastava
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSAmazon Web Services
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkpromediakw
 
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxAkashMalkood1
 
Practical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWSPractical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWSAmazon Web Services
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 

Similar to Wap wml-6 (20)

Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 
Web security
Web securityWeb security
Web security
 
Vpn
VpnVpn
Vpn
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWS
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
 
Unit08
Unit08Unit08
Unit08
 
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptx
 
Practical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWSPractical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWS
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 

More from Ankit Anand

More from Ankit Anand (20)

Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wtls
WtlsWtls
Wtls
 
Data (1)
Data (1)Data (1)
Data (1)
 
Mc
McMc
Mc
 
Mc seminar
Mc seminarMc seminar
Mc seminar
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Middleware final
Middleware finalMiddleware final
Middleware final
 
Web services
Web servicesWeb services
Web services
 
Wap wml
Wap wmlWap wml
Wap wml
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn
VpnVpn
Vpn
 
Enhanced data gsm environment
Enhanced data gsm environmentEnhanced data gsm environment
Enhanced data gsm environment
 
Seminar gprs
Seminar gprsSeminar gprs
Seminar gprs
 
Seminar mc palm
Seminar mc palmSeminar mc palm
Seminar mc palm
 
Guided media
Guided mediaGuided media
Guided media
 
12 mobile os
12 mobile os12 mobile os
12 mobile os
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Wap wml-6

  • 1. A Power point Presentation on WAP Security
  • 2. Overview • Security Basics • Wireless Security • WTLS & SSL • WAP Security Models • WIM, WMLScript, Access Control • Summary • References
  • 3. Security Basics • Security Goals – Authentication – Confidentiality – Integrity – Authorization – Non-Repudiation
  • 4. Security Basics • Cryptography – Symmetric: 3DES, RC4, etc. – Asymmetric: RSA, ECC • Key Exchange • Digital Signature • Certificates • PKI
  • 5. Wireless Security • Link Layer Security – GSM – CDMA – CDPD • Application Layer Security – WAP: WTLS, WML, WMLScript, & SSL – iMode: N/A – SMS: N/A
  • 6. Need for App Level Security • Bearer Independence • Security out to Gateway • Advanced Security Goals (ie. Non-Repudiation)
  • 8. WAP Security Models • Operator Hosts Gateway – Without PKI – With PKI • Content Provider Hosts Gateway – Static Gateway Connection – Dynamic Gateway Connection
  • 9. Operator Hosts Gateway • Without PKI Internet WAP/HDTP Gateway Web Server WTLS Class 1 or Encrypted HDTP SSL Operator Content Provider
  • 10. Operator Hosts Gateway • Without PKI: – Advantages • No extra work for Content Provider • No extra work for user • System only requires one logical gateway – Disadvantages • Content Provider must trust Operator (NDA) • Operator can control home deck • Operator can introduce advertising
  • 12. Operator Hosts Gateway • With PKI: – Advantages • Content providers does not need to trust Operator. – Disadvantages • PKI Infrastructure must be in place.
  • 13. Content Provider Hosts Gateway • Static Gateway Connection WAP Gateway Web Server WTLS Class 2 SSL Content Provider
  • 14. Content Provider Hosts Gateway • Static Gateway Connection – Advantages • Content Provider does not need to trust Operator • Content Provider can control home deck • OTA can be used to configure mobile terminal – Disadvantages • Mobile terminal may have limited number of gateway config sets (i.e., Nokia 7110 has 10) • Mobile Terminal needs to be configured. – OTA via WAP Push / SMS may not work with gateway / mobile terminal combination – Content Provider may have to pre-configure mobile terminals
  • 15. Content Provider Hosts Gateway • Dynamic Gateway Connection Internet WAP Gateway WTLS Class 2 SSL Operator Web Server SSL Content Provider WAP Gateway
  • 16. Content Provider Hosts Gateway • Dynamic Gateway Connection – Advantages • Content Provider does not need to trust Operator. • Content Provider does not need to worry about mobile terminal config – Disadvantages • Operator needs to trust Content Provider. • Not deployed yet.
  • 17. Restricting Gateway Access • Consider the following attack: – Eve runs a “modified” WAP gateway – Eve fools a user into using her gateway • Now, Eve can eavesdrop on all of the users requests and responses! • To prevent this, check the gateway IP address in the HTTP request.
  • 18. WIM: WAP Identity Module • WIM must be tamper-resistant • Stores Keys & Master Secrets • Computes crypto operations – “unwrapping master secret” – client signature in WTLS Handshake – key exchange (ECC WTLS Handshake) • Also: – Generates Keys – Stores Certificates (or their URLs) • CA & Root Certs • User Certs • Can be implemented with SIM
  • 19. WMLScript Crypto API • Non-repudiation • signedString = Crypto.signText (stringToSign, options, keyIdType, keyId) • Uses a separate, distinct signing key • WIM can store signing key and compute signature
  • 20. WML Access Control • WML Deck-Level Access Control <wml> <head> <access domain=“worldfaq.com” path = “/stats”> </head> <card> … </card> </wml> • WMLScript Access Control use access domain domain_name | path path_name | domain domain_name path path_name; • use access domain “worldfaq.com” path “/stats”
  • 21. Summary • Gateway position & configuration allows for different trust models • Security at multiple levels – Link Layer (depends on bearer) – App Layer • Authentication, Confidentiality, and Integrity: WTLS • Authorization: App-dependent, or WML <access> and WMLScript use access pragma • Non-Repudiation: WML signText
  • 22. References • C. Arehart, N. Chidambaram, S. Guruprasad, et. al. Professional WAP. Wrox Press, 2000. ISBN 1-861004-0-44 • D. Margrave, GSM Security and Encryption • WAP-100, Wireless Application Protocol Architecture Specification • WAP-191, Wireless Markup Language Specification • WAP-193, WMLScript Language Specification • WAP-199, Wireless Transport Layer Security Specification • WAP-198, Wireless Identity Module • WAP-161, WMLScript Crypto API Library • WAP-187, WAP Transport Layer E2E Security Specification • WAP-217, WAP Public Key Infrastructure Definition