SlideShare a Scribd company logo
1 of 14
WOLAITA SODO UNIVERSITY
SHOOL OF INFORMATICS
DEPARTMENT OF INFORMATION TECHNOLOGY
MSC-INFORMATION TECHNOLOGY REGULAR
Article Review On:- Study On Double Encrypt Security
Model Of Mobile Commerce Based On The WAP.
Authors:- Yan Li, Fenfen Wan, and Xiaoqiang Hu,
Group Members ID-NO
1. Sisay Tekle Pgr/82841/15
2. Abebe Tora Pgr/82835/15
3. Tseganesh Firewu Pgr/62941/14
Submitted To: - Temesgen Mengistu (Asst. Prof. In IT)
Sub. Date: - December 19/2023
2
Introduction
ā€¢ The study explores the security model for mobile commerce
using the Wireless Application Protocol (WAP).
ā€¢ It addresses security challenges and proposes a double encryption
model to improve end-to-end security.
ā€¢ The article explores two approaches: self-provided WAP
gateway solutions and gateway navigation type solutions,
emphasizing the importance of security for m-commerce success.
ā€¢ The authors propose a double encryption security model using
Wireless TLS (WAP) for end-to-end security in m-commerce.
3
Cont.,ā€¦
ā€¢ They highlight security weaknesses in existing WAP deployments,
particularly in communication between WAP gateway and
content providers.
ā€¢ The WAP architecture includes mobile devices, gateways, and
content servers.
ā€¢ The study highlights limitations of current methods and
emphasizes long-term development and user convenience, but
could benefit from more detailed implementation and evaluation
of the proposed security model. 3
4
Significance of the Article
ā€¢ The article addresses an important issue in the field of mobile
commerce, namely the security challenges associated with
wireless communication networks.
ā€¢ By means of the increasing popularity of m-commerce and the
reliance on mobile devices for conducting business
transactions, ensuring the security of these transactions
becomes crucial.
ā€¢ The article aims to propose a solution to enhance the security
of m-commerce based on the WAP protocol. 4
5
Double Encrypt Security Model
ā€¢ The article introduces the concept of a double encrypt security
model based on WAP.
ā€¢ This model is designed to provide end-to-end security for m-
commerce transactions.
ā€¢ By resources of utilizing the Wireless Transport Layer Security
(WTLS) protocol and encryption techniques, the proposed
model aims to protect data integrity, ensure data privacy, and
facilitate authentication between mobile devices and application
servers. 5
Cont.,ā€¦
ā€¢ First, some important confidential information are encrypted by Ke in
the application layer.
ā€¢ Information reaches the WAP gateway, it decrypted by the WTLS of
Ke1.
ā€¢ WAP gateway and content server use TLS to ensure secure connection.
At this time, the WAP gateway and content server share Ke2 and
encrypt again.
ā€¢ After information arrives to the content server, it decrypted by Ke2.
7
Analysis of Existing Approaches
ā€¢ The article provides a critical analysis of existing approaches,
particularly focusing on content provider self-provided WAP
gateway solutions.
ā€¢ By pointing out the limitations and drawbacks of these
approaches, such as the need for manual mobile phone settings
and potential user inconvenience, the authors highlight the
importance of considering long-term development and user
acceptance in implementing security solutions for m-
commerce. 7
WAPArchitecture & Security Construction
ā€¢ The article explains the architecture of WAP, which comprises
mobile devices, WAP gateways, and content servers.
ā€¢ It moreover discusses the security construction of WAP,
including the role of WTLS, WAP Identify Module, Wireless
Public Key Infrastructure (WPKI), and WML Script.
ā€¢ This provides a comprehensive understanding of the
components and protocols involved in securing m-commerce
transactions.
Cont.,ā€¦
Article Gaps and Future Directions
ā€¢ Though the article presents a novel double encrypt security
model, it acknowledges the need for further research and
development in this area.
ā€¢ The authors identify article gaps and suggest future directions,
such as evaluating the proposed model through practical
implementations and assessing its effectiveness in real-world m-
commerce scenarios.
11
Article contributes to the existing body
ā€¢ knowledge on mobile commerce security and proposes a viable
solution to enhance the security of m-commerce transactions.
ā€¢ It provides insights into the challenges faced in securing
wireless communication networks and offers a comprehensive
analysis of existing approaches.
ā€¢ The article opens avenues for further exploration and sets the
stage for future advancements in securing m-commerce based
on the WAP protocol.
11
Conclusion
ā€¢ M-commerce is a rapidly growing e-commerce system that ensures
integrity, confidentiality, non-repudiation, and authentication of mobile
equipment and server information through multi-encrypted
transmission.
ā€¢ The model necessitates an interactive process for establishing a secure
channel between mobile terminals and content servers, necessitating
faster encryption and decryption for practical application.
References
1. Qin Chengde, Wang Rulin. ā€œMobile commerce,ā€ Beijing:
Posts & Telecom Press , 2010.03 -15.
2. Yang Qin. ā€œMobile commerce: Theory and
Applications,ā€ Beijing: Tsinghua University Press , 2006.
123 -134.
3. Hu Junfeng, Li Liming. ā€œThe Design and Analysis WAP
security model,ā€ Mechatronics, 2011, (2).
4. Shu Kai. ā€œInformation security Research in M-
commerce,ā€ Information Technology & Standar dization,
2010, (8).
5. Cheng Yang. ā€œStudy on security of m-commerce,ā€
Shenyang Ligong University , 2008, 40-56.
14
14

More Related Content

Similar to Study On Double Encrypt Security Model Of Mobile Commerce Based On The WAP.

Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...S3 Infotech IEEE Projects
Ā 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
Ā 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
Ā 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYcscpconf
Ā 
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologycsandit
Ā 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerPutra Wanda
Ā 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
Ā 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsVijay Karan
Ā 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsVijay Karan
Ā 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsVijay Karan
Ā 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
Ā 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityOlivia Moran
Ā 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
Ā 
A Comparative Study for Block Chain Applications in the MANET
A Comparative Study for Block Chain Applications in the MANETA Comparative Study for Block Chain Applications in the MANET
A Comparative Study for Block Chain Applications in the MANETpijans
Ā 
A COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANET
A COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANETA COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANET
A COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANETpijans
Ā 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
Ā 
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...James Heller
Ā 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
Ā 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Ā 

Similar to Study On Double Encrypt Security Model Of Mobile Commerce Based On The WAP. (20)

Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Ā 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Ā 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
Ā 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
Ā 
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
Ā 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Ā 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
Ā 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
Ā 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
Ā 
vanderMerweMScEngThesis
vanderMerweMScEngThesisvanderMerweMScEngThesis
vanderMerweMScEngThesis
Ā 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Ā 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
Ā 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless Security
Ā 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
Ā 
A Comparative Study for Block Chain Applications in the MANET
A Comparative Study for Block Chain Applications in the MANETA Comparative Study for Block Chain Applications in the MANET
A Comparative Study for Block Chain Applications in the MANET
Ā 
A COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANET
A COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANETA COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANET
A COMPARATIVE STUDY FOR BLOCK CHAIN APPLICATIONS IN THE MANET
Ā 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
Ā 
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...
Ā 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
Ā 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
Ā 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
Ā 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationRadu Cotescu
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024The Digital Insurer
Ā 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
Ā 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organization
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Ā 

Study On Double Encrypt Security Model Of Mobile Commerce Based On The WAP.

  • 1. WOLAITA SODO UNIVERSITY SHOOL OF INFORMATICS DEPARTMENT OF INFORMATION TECHNOLOGY MSC-INFORMATION TECHNOLOGY REGULAR Article Review On:- Study On Double Encrypt Security Model Of Mobile Commerce Based On The WAP. Authors:- Yan Li, Fenfen Wan, and Xiaoqiang Hu, Group Members ID-NO 1. Sisay Tekle Pgr/82841/15 2. Abebe Tora Pgr/82835/15 3. Tseganesh Firewu Pgr/62941/14 Submitted To: - Temesgen Mengistu (Asst. Prof. In IT) Sub. Date: - December 19/2023
  • 2. 2 Introduction ā€¢ The study explores the security model for mobile commerce using the Wireless Application Protocol (WAP). ā€¢ It addresses security challenges and proposes a double encryption model to improve end-to-end security. ā€¢ The article explores two approaches: self-provided WAP gateway solutions and gateway navigation type solutions, emphasizing the importance of security for m-commerce success. ā€¢ The authors propose a double encryption security model using Wireless TLS (WAP) for end-to-end security in m-commerce.
  • 3. 3 Cont.,ā€¦ ā€¢ They highlight security weaknesses in existing WAP deployments, particularly in communication between WAP gateway and content providers. ā€¢ The WAP architecture includes mobile devices, gateways, and content servers. ā€¢ The study highlights limitations of current methods and emphasizes long-term development and user convenience, but could benefit from more detailed implementation and evaluation of the proposed security model. 3
  • 4. 4 Significance of the Article ā€¢ The article addresses an important issue in the field of mobile commerce, namely the security challenges associated with wireless communication networks. ā€¢ By means of the increasing popularity of m-commerce and the reliance on mobile devices for conducting business transactions, ensuring the security of these transactions becomes crucial. ā€¢ The article aims to propose a solution to enhance the security of m-commerce based on the WAP protocol. 4
  • 5. 5 Double Encrypt Security Model ā€¢ The article introduces the concept of a double encrypt security model based on WAP. ā€¢ This model is designed to provide end-to-end security for m- commerce transactions. ā€¢ By resources of utilizing the Wireless Transport Layer Security (WTLS) protocol and encryption techniques, the proposed model aims to protect data integrity, ensure data privacy, and facilitate authentication between mobile devices and application servers. 5
  • 6. Cont.,ā€¦ ā€¢ First, some important confidential information are encrypted by Ke in the application layer. ā€¢ Information reaches the WAP gateway, it decrypted by the WTLS of Ke1. ā€¢ WAP gateway and content server use TLS to ensure secure connection. At this time, the WAP gateway and content server share Ke2 and encrypt again. ā€¢ After information arrives to the content server, it decrypted by Ke2.
  • 7. 7 Analysis of Existing Approaches ā€¢ The article provides a critical analysis of existing approaches, particularly focusing on content provider self-provided WAP gateway solutions. ā€¢ By pointing out the limitations and drawbacks of these approaches, such as the need for manual mobile phone settings and potential user inconvenience, the authors highlight the importance of considering long-term development and user acceptance in implementing security solutions for m- commerce. 7
  • 8. WAPArchitecture & Security Construction ā€¢ The article explains the architecture of WAP, which comprises mobile devices, WAP gateways, and content servers. ā€¢ It moreover discusses the security construction of WAP, including the role of WTLS, WAP Identify Module, Wireless Public Key Infrastructure (WPKI), and WML Script. ā€¢ This provides a comprehensive understanding of the components and protocols involved in securing m-commerce transactions.
  • 10. Article Gaps and Future Directions ā€¢ Though the article presents a novel double encrypt security model, it acknowledges the need for further research and development in this area. ā€¢ The authors identify article gaps and suggest future directions, such as evaluating the proposed model through practical implementations and assessing its effectiveness in real-world m- commerce scenarios.
  • 11. 11 Article contributes to the existing body ā€¢ knowledge on mobile commerce security and proposes a viable solution to enhance the security of m-commerce transactions. ā€¢ It provides insights into the challenges faced in securing wireless communication networks and offers a comprehensive analysis of existing approaches. ā€¢ The article opens avenues for further exploration and sets the stage for future advancements in securing m-commerce based on the WAP protocol. 11
  • 12. Conclusion ā€¢ M-commerce is a rapidly growing e-commerce system that ensures integrity, confidentiality, non-repudiation, and authentication of mobile equipment and server information through multi-encrypted transmission. ā€¢ The model necessitates an interactive process for establishing a secure channel between mobile terminals and content servers, necessitating faster encryption and decryption for practical application.
  • 13. References 1. Qin Chengde, Wang Rulin. ā€œMobile commerce,ā€ Beijing: Posts & Telecom Press , 2010.03 -15. 2. Yang Qin. ā€œMobile commerce: Theory and Applications,ā€ Beijing: Tsinghua University Press , 2006. 123 -134. 3. Hu Junfeng, Li Liming. ā€œThe Design and Analysis WAP security model,ā€ Mechatronics, 2011, (2). 4. Shu Kai. ā€œInformation security Research in M- commerce,ā€ Information Technology & Standar dization, 2010, (8). 5. Cheng Yang. ā€œStudy on security of m-commerce,ā€ Shenyang Ligong University , 2008, 40-56.
  • 14. 14 14