Improving the WTLS by means of Kerberos

The Wireless Application Protocol (WAP) is a protocol stack for wireless communication networks. Wireless Transport Layer Security (WTLS) is the security protocol of the WAP and it operates over the transport layer. Analysis of the WTLS agreement reveals that the certification process in the handshake agreement presents a risk of intermediary anonymous attack that we denote man-in-the-middle-attack. This paper presents a way to mitigate this risk by addition of a Kerberos authentication system to the WTLS agreement in order to improve the security of the latter. At the same time, the paper gives a detailed description of the solutions involved in the data structure, a simulation model of the program, and discusses reasonable values for the simulation parameters.

[1]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[2]  Albert Levi,et al.  Performance evaluation of public-key cryptosystem operations in WTLS protocol , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[3]  Daniel A. Menascé,et al.  Performance of public-key-enabled Kerberos authentication in large networks , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[4]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[5]  Larry Zhu,et al.  Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) , 2006, RFC.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Kwangjo Kim,et al.  Wireless Authentication Protocol Preserving User Anonymity , 2001 .

[8]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[9]  Semih Bilgen,et al.  Wireless application protocol transport layer performance , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[10]  JaeCheol Ha,et al.  A WTLS Handshake Protocol with User Anonymity and Forward Secrecy , 2002, CDMA International Conference.

[11]  KnutWoller,et al.  After the First Five Years:Central Linux Support at DESY , 2001 .

[12]  Daniel A. Menascé,et al.  The performance of public key-enabled kerberos authentication in mobile computing applications , 2001, CCS '01.

[13]  K. Ramasamy,et al.  Security issues in WAP WTLS protocol , 2002, IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions.

[14]  Matthew J. B. Robshaw,et al.  A Note on the Security of the OAEP-Enhanced RSA Public-Key Encryption Scheme , 1999 .