SlideShare a Scribd company logo
A Power point Presentation on
WAP Security
Overview
• Security Basics
• Wireless Security
• WTLS & SSL
• WAP Security Models
• WIM, WMLScript, Access Control
• Summary
• References
Security Basics
• Security Goals
– Authentication
– Confidentiality
– Integrity
– Authorization
– Non-Repudiation
Security Basics
• Cryptography
– Symmetric: 3DES, RC4, etc.
– Asymmetric: RSA, ECC
• Key Exchange
• Digital Signature
• Certificates
• PKI
Wireless Security
• Link Layer Security
– GSM
– CDMA
– CDPD
• Application Layer Security
– WAP: WTLS, WML, WMLScript, & SSL
– iMode: N/A
– SMS: N/A
Need for App Level Security
• Bearer
Independence
• Security out to Gateway
• Advanced Security Goals
(ie. Non-Repudiation)
Basic WAP Architecture
Internet
Gateway
Web Server
WTLS SSL
WAP Security Models
• Operator Hosts Gateway
– Without PKI
– With PKI
• Content Provider Hosts Gateway
– Static Gateway Connection
– Dynamic Gateway Connection
Operator Hosts Gateway
• Without PKI
Internet
WAP/HDTP
Gateway
Web Server
WTLS Class 1 or Encrypted HDTP SSL
Operator
Content
Provider
Operator Hosts Gateway
• Without PKI:
– Advantages
• No extra work for Content Provider
• No extra work for user
• System only requires one logical gateway
– Disadvantages
• Content Provider must trust Operator (NDA)
• Operator can control home deck
• Operator can introduce advertising
Operator Hosts Gateway
• With PKI
Operator Hosts Gateway
• With PKI:
– Advantages
• Content providers does not need to
trust Operator.
– Disadvantages
• PKI Infrastructure must be in place.
Content Provider Hosts Gateway
• Static Gateway Connection
WAP
Gateway
Web Server
WTLS Class 2
SSL
Content
Provider
Content Provider Hosts Gateway
• Static Gateway Connection
– Advantages
• Content Provider does not need to trust
Operator
• Content Provider can control home deck
• OTA can be used to configure mobile terminal
– Disadvantages
• Mobile terminal may have limited number of
gateway config sets (i.e., Nokia 7110 has 10)
• Mobile Terminal needs to be configured.
– OTA via WAP Push / SMS may not work with
gateway / mobile terminal combination
– Content Provider may have to pre-configure
mobile terminals
Content Provider Hosts Gateway
• Dynamic Gateway Connection
Internet
WAP
Gateway
WTLS Class 2 SSL
Operator
Web
Server
SSL
Content
Provider
WAP
Gateway
Content Provider Hosts Gateway
• Dynamic Gateway Connection
– Advantages
• Content Provider does not need to trust
Operator.
• Content Provider does not need to
worry about mobile terminal config
– Disadvantages
• Operator needs to trust Content
Provider.
• Not deployed yet.
Restricting Gateway Access
• Consider the following attack:
– Eve runs a “modified” WAP gateway
– Eve fools a user into using her gateway
• Now, Eve can eavesdrop on all of the
users requests and responses!
• To prevent this, check the gateway IP
address in the HTTP request.
WIM: WAP Identity Module
• WIM must be tamper-resistant
• Stores Keys & Master Secrets
• Computes crypto operations
– “unwrapping master secret”
– client signature in WTLS Handshake
– key exchange (ECC WTLS Handshake)
• Also:
– Generates Keys
– Stores Certificates (or their URLs)
• CA & Root Certs
• User Certs
• Can be implemented with SIM
WMLScript Crypto API
• Non-repudiation
• signedString = Crypto.signText
(stringToSign, options, keyIdType,
keyId)
• Uses a separate, distinct signing key
• WIM can store signing key and
compute signature
WML Access Control
• WML Deck-Level Access Control
<wml>
<head>
<access domain=“worldfaq.com” path = “/stats”>
</head>
<card>
…
</card>
</wml>
• WMLScript Access Control
use access
domain domain_name |
path path_name |
domain domain_name path path_name;
• use access domain “worldfaq.com” path “/stats”
Summary
• Gateway position & configuration
allows for different trust models
• Security at multiple levels
– Link Layer (depends on bearer)
– App Layer
• Authentication,
Confidentiality, and
Integrity: WTLS
• Authorization: App-dependent, or WML
<access> and WMLScript use access pragma
• Non-Repudiation: WML signText
References
• C. Arehart, N. Chidambaram, S. Guruprasad, et. al.
Professional WAP. Wrox Press, 2000. ISBN 1-861004-0-44
• D. Margrave, GSM Security and Encryption
• WAP-100, Wireless Application Protocol Architecture
Specification
• WAP-191, Wireless Markup Language Specification
• WAP-193, WMLScript Language Specification
• WAP-199, Wireless Transport Layer Security Specification
• WAP-198, Wireless Identity Module
• WAP-161, WMLScript Crypto API Library
• WAP-187, WAP Transport Layer E2E Security Specification
• WAP-217, WAP Public Key Infrastructure Definition

More Related Content

What's hot

Proxy server
Proxy serverProxy server
Proxy server
Dlovan Salih
 
Cloudron bay lisa-presentation
Cloudron bay lisa-presentationCloudron bay lisa-presentation
Cloudron bay lisa-presentation
Girish Ramakrishnan
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept
Mostafa El Lathy
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
primeteacher32
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
ServicePilot
 
Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3
Alexandra N. Martinez
 
Webservice security considerations and measures
Webservice security considerations and measuresWebservice security considerations and measures
Webservice security considerations and measures
Maarten Smeets
 
WSO2 Application Server
WSO2 Application ServerWSO2 Application Server
WSO2 Application Server
Sagara Gunathunga
 
Application Monitoring with WSO2 App Server
Application Monitoring with WSO2 App ServerApplication Monitoring with WSO2 App Server
Application Monitoring with WSO2 App Server
Sagara Gunathunga
 
K8s Webhook Admission
K8s Webhook AdmissionK8s Webhook Admission
K8s Webhook Admission
Huynh Thai Bao
 
Dangerous Demo: Apidaze
Dangerous Demo: ApidazeDangerous Demo: Apidaze
Dangerous Demo: Apidaze
Alan Quayle
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - Webinar
Cloudflare
 
Access control
Access controlAccess control
Access control
Aravindan A
 
Proxy
ProxyProxy
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
Mostafa El Lathy
 

What's hot (15)

Proxy server
Proxy serverProxy server
Proxy server
 
Cloudron bay lisa-presentation
Cloudron bay lisa-presentationCloudron bay lisa-presentation
Cloudron bay lisa-presentation
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3
 
Webservice security considerations and measures
Webservice security considerations and measuresWebservice security considerations and measures
Webservice security considerations and measures
 
WSO2 Application Server
WSO2 Application ServerWSO2 Application Server
WSO2 Application Server
 
Application Monitoring with WSO2 App Server
Application Monitoring with WSO2 App ServerApplication Monitoring with WSO2 App Server
Application Monitoring with WSO2 App Server
 
K8s Webhook Admission
K8s Webhook AdmissionK8s Webhook Admission
K8s Webhook Admission
 
Dangerous Demo: Apidaze
Dangerous Demo: ApidazeDangerous Demo: Apidaze
Dangerous Demo: Apidaze
 
CloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - WebinarCloudFlare - The Heartbleed Bug - Webinar
CloudFlare - The Heartbleed Bug - Webinar
 
Access control
Access controlAccess control
Access control
 
Proxy
ProxyProxy
Proxy
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
 

Similar to Wap wml-6

Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
Ram Dutt Shukla
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
Nishant Pahad
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Võ Thái Lâm
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Security Bootcamp
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
Neelkamal Gaharwar
 
Web security
Web securityWeb security
Web security
Muhammad Usman
 
Vpn
VpnVpn
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
RightScale
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
Gaurav Sharma
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
Aidan Finn
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
SonukumarRawat
 
The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)
Channy Yun
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWS
Amazon Web Services
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
promediakw
 
Unit08
Unit08Unit08
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptx
AkashMalkood1
 
Practical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWSPractical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWS
Amazon Web Services
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 

Similar to Wap wml-6 (20)

Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 
Web security
Web securityWeb security
Web security
 
Vpn
VpnVpn
Vpn
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWS
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
 
Unit08
Unit08Unit08
Unit08
 
Cisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptxCisco-Wireless-Guest-v10.pptx
Cisco-Wireless-Guest-v10.pptx
 
Practical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWSPractical Steps to Hackproofing AWS
Practical Steps to Hackproofing AWS
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 

More from Ankit Anand

Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
Ankit Anand
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
Ankit Anand
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
Ankit Anand
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
Ankit Anand
 
Wtls
WtlsWtls
Data (1)
Data (1)Data (1)
Data (1)
Ankit Anand
 
Mc
McMc
Mc seminar
Mc seminarMc seminar
Mc seminar
Ankit Anand
 
Mcseminar
McseminarMcseminar
Mcseminar
Ankit Anand
 
Middleware final
Middleware finalMiddleware final
Middleware final
Ankit Anand
 
Web services
Web servicesWeb services
Web services
Ankit Anand
 
Wap wml
Wap wmlWap wml
Wap wml
Ankit Anand
 
Vpn 3
Vpn 3Vpn 3
Vpn
VpnVpn
Enhanced data gsm environment
Enhanced data gsm environmentEnhanced data gsm environment
Enhanced data gsm environment
Ankit Anand
 
Seminar gprs
Seminar gprsSeminar gprs
Seminar gprs
Ankit Anand
 
Seminar mc palm
Seminar mc palmSeminar mc palm
Seminar mc palm
Ankit Anand
 
Guided media
Guided mediaGuided media
Guided media
Ankit Anand
 
12 mobile os
12 mobile os12 mobile os
12 mobile os
Ankit Anand
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
Ankit Anand
 

More from Ankit Anand (20)

Voice oriented data communication
Voice oriented data communicationVoice oriented data communication
Voice oriented data communication
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wtls
WtlsWtls
Wtls
 
Data (1)
Data (1)Data (1)
Data (1)
 
Mc
McMc
Mc
 
Mc seminar
Mc seminarMc seminar
Mc seminar
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Middleware final
Middleware finalMiddleware final
Middleware final
 
Web services
Web servicesWeb services
Web services
 
Wap wml
Wap wmlWap wml
Wap wml
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Vpn
VpnVpn
Vpn
 
Enhanced data gsm environment
Enhanced data gsm environmentEnhanced data gsm environment
Enhanced data gsm environment
 
Seminar gprs
Seminar gprsSeminar gprs
Seminar gprs
 
Seminar mc palm
Seminar mc palmSeminar mc palm
Seminar mc palm
 
Guided media
Guided mediaGuided media
Guided media
 
12 mobile os
12 mobile os12 mobile os
12 mobile os
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 

Wap wml-6

  • 1. A Power point Presentation on WAP Security
  • 2. Overview • Security Basics • Wireless Security • WTLS & SSL • WAP Security Models • WIM, WMLScript, Access Control • Summary • References
  • 3. Security Basics • Security Goals – Authentication – Confidentiality – Integrity – Authorization – Non-Repudiation
  • 4. Security Basics • Cryptography – Symmetric: 3DES, RC4, etc. – Asymmetric: RSA, ECC • Key Exchange • Digital Signature • Certificates • PKI
  • 5. Wireless Security • Link Layer Security – GSM – CDMA – CDPD • Application Layer Security – WAP: WTLS, WML, WMLScript, & SSL – iMode: N/A – SMS: N/A
  • 6. Need for App Level Security • Bearer Independence • Security out to Gateway • Advanced Security Goals (ie. Non-Repudiation)
  • 8. WAP Security Models • Operator Hosts Gateway – Without PKI – With PKI • Content Provider Hosts Gateway – Static Gateway Connection – Dynamic Gateway Connection
  • 9. Operator Hosts Gateway • Without PKI Internet WAP/HDTP Gateway Web Server WTLS Class 1 or Encrypted HDTP SSL Operator Content Provider
  • 10. Operator Hosts Gateway • Without PKI: – Advantages • No extra work for Content Provider • No extra work for user • System only requires one logical gateway – Disadvantages • Content Provider must trust Operator (NDA) • Operator can control home deck • Operator can introduce advertising
  • 12. Operator Hosts Gateway • With PKI: – Advantages • Content providers does not need to trust Operator. – Disadvantages • PKI Infrastructure must be in place.
  • 13. Content Provider Hosts Gateway • Static Gateway Connection WAP Gateway Web Server WTLS Class 2 SSL Content Provider
  • 14. Content Provider Hosts Gateway • Static Gateway Connection – Advantages • Content Provider does not need to trust Operator • Content Provider can control home deck • OTA can be used to configure mobile terminal – Disadvantages • Mobile terminal may have limited number of gateway config sets (i.e., Nokia 7110 has 10) • Mobile Terminal needs to be configured. – OTA via WAP Push / SMS may not work with gateway / mobile terminal combination – Content Provider may have to pre-configure mobile terminals
  • 15. Content Provider Hosts Gateway • Dynamic Gateway Connection Internet WAP Gateway WTLS Class 2 SSL Operator Web Server SSL Content Provider WAP Gateway
  • 16. Content Provider Hosts Gateway • Dynamic Gateway Connection – Advantages • Content Provider does not need to trust Operator. • Content Provider does not need to worry about mobile terminal config – Disadvantages • Operator needs to trust Content Provider. • Not deployed yet.
  • 17. Restricting Gateway Access • Consider the following attack: – Eve runs a “modified” WAP gateway – Eve fools a user into using her gateway • Now, Eve can eavesdrop on all of the users requests and responses! • To prevent this, check the gateway IP address in the HTTP request.
  • 18. WIM: WAP Identity Module • WIM must be tamper-resistant • Stores Keys & Master Secrets • Computes crypto operations – “unwrapping master secret” – client signature in WTLS Handshake – key exchange (ECC WTLS Handshake) • Also: – Generates Keys – Stores Certificates (or their URLs) • CA & Root Certs • User Certs • Can be implemented with SIM
  • 19. WMLScript Crypto API • Non-repudiation • signedString = Crypto.signText (stringToSign, options, keyIdType, keyId) • Uses a separate, distinct signing key • WIM can store signing key and compute signature
  • 20. WML Access Control • WML Deck-Level Access Control <wml> <head> <access domain=“worldfaq.com” path = “/stats”> </head> <card> … </card> </wml> • WMLScript Access Control use access domain domain_name | path path_name | domain domain_name path path_name; • use access domain “worldfaq.com” path “/stats”
  • 21. Summary • Gateway position & configuration allows for different trust models • Security at multiple levels – Link Layer (depends on bearer) – App Layer • Authentication, Confidentiality, and Integrity: WTLS • Authorization: App-dependent, or WML <access> and WMLScript use access pragma • Non-Repudiation: WML signText
  • 22. References • C. Arehart, N. Chidambaram, S. Guruprasad, et. al. Professional WAP. Wrox Press, 2000. ISBN 1-861004-0-44 • D. Margrave, GSM Security and Encryption • WAP-100, Wireless Application Protocol Architecture Specification • WAP-191, Wireless Markup Language Specification • WAP-193, WMLScript Language Specification • WAP-199, Wireless Transport Layer Security Specification • WAP-198, Wireless Identity Module • WAP-161, WMLScript Crypto API Library • WAP-187, WAP Transport Layer E2E Security Specification • WAP-217, WAP Public Key Infrastructure Definition