Abstract

With the developments of wireless communication and wireless network technology, the wireless data service will be more widely used in commerce. In order to realize safe electronic commerce, the security of wireless network should be assured. As a rising technology to implement wireless network safety,WPKI (Wireless Public Key Infrastructure) becomes more and more important. This article will discuss structure, implementing principle, security infrastructure, application model and application in wireless network environment of WPKI, analyze the functions of WPKI in WAP security, and probe into the application prospect of WPKI.

Highlights

  • With the developments of mobile communication technology and Internet, the application wireless communication technology gradually becomes mature, and its security becomes more and more important

  • PKI is the key management platform to pellucidly provide key and certificate management needed by cryptogram services such as encrypting and digital signature for all cable network applications

  • WPKI adopts some management mechanism being differ from PKI to fulfill the needs of wireless network environment

Read more

Summary

Introduction

With the developments of mobile communication technology and Internet, the application wireless communication technology gradually becomes mature, and its security becomes more and more important. One important security guarantee is PKI (Public Key Infrastructure). PKI is the key management platform to pellucidly provide key and certificate management needed by cryptogram services such as encrypting and digital signature for all cable network applications. WPKI (Wireless Public Key Infrastructure) properly complements, optimizes and improves PKI to fulfill the requests including secrecy, integrality, authenticity and undeniable character of wireless network security. WPKI adopts some management mechanism being differ from PKI to fulfill the needs of wireless network environment

Structure of WPKI
Implementing principle
Security infrastructure
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.