You are on page 1of 2

I" lnternuttonal Conference on Advances

In

Compuung. Chtkhh, 1111,(/. : 1-2!

February 1008

WAP Protocols and Security


Prof B.L.Gunjal
MTech Student Computer Oeptt, AVCOE, Sangamner, Oist -A'naqar (91)9890308807

Prof Suhas Patil


PhO. Student Camp Oeptt, BVCOE, Dhankawadi, Pune-43 (91 )9422366527

Prof R.S. Patil


PhO. Student MBA, Sangamner, Oist-A'nagar (91) 9422235320

hello_baisa@yahoo_com

suhas_patil@yahoo.com Abstract
Wireless application protocol l \\'AP) is an application environment and 5Ct" of communication protocols for \\ ire less devices. WAP enables any data transport: TCP/IP, UDP/IP, SMS, or USSD. WAP utilizes plain Web HTTP 1.1 servers: CGI, ASP, NSAPI, JAVA, Servlets, de. WAP specifies a "\'irc:k~, application Environment and Wireless Protocols and bridges the gap between the mobile world and the Internet. The basic construction of \V AP architecture with W AP slack with different layers. In a real WAP solution, the main components include WAP Device, Bearer, W AP Gateway, Content, and Content Server. Communication of mobile client and Web server happens through WAP gateway. WML and WML script are used to produce W AI' content. W AP functioning includes sending the request from the mobile dc\ ice is sent as :1 URL through the operator's network to the \':\1' gateway. WAP security is very important issue. WAP may have attacks like Interception, Modification, Fabrication, and Interruption. This paper also includes limitations of WAP, Strengths of WAf', WAP today and in future, Risks with WAP. Keywards: WAP. Cryptography. attacks, ["{fID. Criminal Blue tooth. WML, Nokia.

rakeshspatil@yahoo.com

Figure W AP client, WAP elements ofWAP. Following gartegay

I.Rolc of WAr
and WAP saver arc important

is the list of W AI' developers.

ij AT&T iij GTE iii] Sprint PCS ivj US West vl Nextel vi] France Telecom viij'Telenor (Norway) vii] [Bell Mobility (Canada) ix] Japan Telecom x ] Nokia xi] Ericsson xii] Motorola xiii] Qualcomrn xiv] Samsung xv] Palm Computing (3Com) xvijlBM

WAP GATEWAY

1
Wireless

WIRELESS COMMUNICATION
Figure: 2.
Communication W AP gateway. Role

application protocol (W AP) is an application environment and set of communication protocols tor wifeless devices designed to enable manufacturer, vendor, and technology independent access to the Internet and advanced telephony services.

of WAP gateway.
and Web server happens through

of mobile client

INTRODUCTION

TO WAP

Wireless Application Protocol Facilitates communication between a wireless device and a gateway, which in turn allows communication with Internet- Of intranet-based resources.

3.1
r

WAP functioning

Permission to make digital or hard copies ofall or part of this work for personal or classroom use rs granted without fee provided that copies arc nOI made or distnbuted for profit or commercial advantage and that copies bear thrs nonce and the full crtation on the first page. To copv otherwise, or republish, 10 post on servers or to redistribute to lists, requires prior specific permission and/or a fee. (CACConfer~nce'08, February 2t-22, 2008,Chikhli, M S INDIA, Copyright 2008 Research Publications, Chikhli, India

~..,a- .

Ii

Figure 2.Functioning

of WAP gateways.

I" lnternauonal Conference on Advances tn Compuung. Chtkhli, lndut, 2122 February cOOS

W AP provides multiple appl ications, markets such as banking, corporate messaging interface.

lor business and customer database access, and a

6.1

Components

of Security

3.2

Architecture

of the W AP Gateway

following are the major security issues related to WAP. I. Confidentiality 2. Cryptography 3. Integrity 4. Authorization 5. Non-repudiation 6. Availability 7. Trust 8. Mobile Virus 9. RHD.

WAP protocol stack is designed to minimize the required bandwidth and maximize the number of wireless network
te-pes tint can deliver targeted, with additional W AP content. Multiple multiple networks networks. will be

LlMtTAT10NS

OF WAP
low

aim oftargeting

WAP prov ides small pages and Pages have to be small ands transmission speeds. The gateway itself is a security concern.

WAP PROTOCOL
stack mainly tor WAP. provide

STACK
WAE (Wireless Application

\\..-\P protocol

CONCLUSION.

Environment

:)
Wireless

W(RELESS

MARKUP

LANGUAGE

WAP is daily need of mobile users. Using WAP it's easy tor mobile users to access internet and other networking services through mobile. It gives anyone access to an indefinite amount of information at any time and is expandable. But it is uncertain i.e. If connected then we can use it.

Application Environment (W.I\E): It is "user visible" layer with WML interpreter (Web Browser), WMLScript interpreter, Wireless Telephony Application. WML is inherited lrom H rJ\.1L, but WML is based on XML, so it is much stricter than IITML. WML is used to create pages that can be displayed in a W <\!' browser.

9
[I] [21

REFERENCES
Talukder and Yavagal.
Hill, 2005. Page
I 0:

"Mobile Computing", Tata McGraw

200-259

WAP SECURITY
is very important

ARCHITECTURE
issue. W AP may have attacks [31

John Groe .. Polar Transmitters tor Wireless Communications'. "IEEE Communications ". Vol 45, No 3. September 2007, Pf': 5863 S. Radha and Niranjay August 2007,f'P:315-327

WAP security IIk<::

Networks '. " [ElF Journal


party gaining access to an asset [41 party tampering with it is part [5] An unauthorized party inserts counterfeited objects Alison Skratt, "Mobile

Ravindran .. Mobile Ad-hoc 0/ research ", Vol 53, No -I. JulyComputing', PP: II

I. Interception: An unauthorized will be part of this attack. 2. Modification: of this attack. 3. Fabrication: An unauthorized

and Wireless

--IEEE

Internet Computing ", July-August-2007,


http://www.bluc:touth.com/bluetooth/

into the system.


4. Interruption: An asset is destroyed.

You might also like