Professional Documents
Culture Documents
In
February 1008
hello_baisa@yahoo_com
suhas_patil@yahoo.com Abstract
Wireless application protocol l \\'AP) is an application environment and 5Ct" of communication protocols for \\ ire less devices. WAP enables any data transport: TCP/IP, UDP/IP, SMS, or USSD. WAP utilizes plain Web HTTP 1.1 servers: CGI, ASP, NSAPI, JAVA, Servlets, de. WAP specifies a "\'irc:k~, application Environment and Wireless Protocols and bridges the gap between the mobile world and the Internet. The basic construction of \V AP architecture with W AP slack with different layers. In a real WAP solution, the main components include WAP Device, Bearer, W AP Gateway, Content, and Content Server. Communication of mobile client and Web server happens through WAP gateway. WML and WML script are used to produce W AI' content. W AP functioning includes sending the request from the mobile dc\ ice is sent as :1 URL through the operator's network to the \':\1' gateway. WAP security is very important issue. WAP may have attacks like Interception, Modification, Fabrication, and Interruption. This paper also includes limitations of WAP, Strengths of WAf', WAP today and in future, Risks with WAP. Keywards: WAP. Cryptography. attacks, ["{fID. Criminal Blue tooth. WML, Nokia.
rakeshspatil@yahoo.com
I.Rolc of WAr
and WAP saver arc important
ij AT&T iij GTE iii] Sprint PCS ivj US West vl Nextel vi] France Telecom viij'Telenor (Norway) vii] [Bell Mobility (Canada) ix] Japan Telecom x ] Nokia xi] Ericsson xii] Motorola xiii] Qualcomrn xiv] Samsung xv] Palm Computing (3Com) xvijlBM
WAP GATEWAY
1
Wireless
WIRELESS COMMUNICATION
Figure: 2.
Communication W AP gateway. Role
application protocol (W AP) is an application environment and set of communication protocols tor wifeless devices designed to enable manufacturer, vendor, and technology independent access to the Internet and advanced telephony services.
of WAP gateway.
and Web server happens through
of mobile client
INTRODUCTION
TO WAP
Wireless Application Protocol Facilitates communication between a wireless device and a gateway, which in turn allows communication with Internet- Of intranet-based resources.
3.1
r
WAP functioning
Permission to make digital or hard copies ofall or part of this work for personal or classroom use rs granted without fee provided that copies arc nOI made or distnbuted for profit or commercial advantage and that copies bear thrs nonce and the full crtation on the first page. To copv otherwise, or republish, 10 post on servers or to redistribute to lists, requires prior specific permission and/or a fee. (CACConfer~nce'08, February 2t-22, 2008,Chikhli, M S INDIA, Copyright 2008 Research Publications, Chikhli, India
~..,a- .
Ii
Figure 2.Functioning
of WAP gateways.
I" lnternauonal Conference on Advances tn Compuung. Chtkhli, lndut, 2122 February cOOS
W AP provides multiple appl ications, markets such as banking, corporate messaging interface.
6.1
Components
of Security
3.2
Architecture
of the W AP Gateway
following are the major security issues related to WAP. I. Confidentiality 2. Cryptography 3. Integrity 4. Authorization 5. Non-repudiation 6. Availability 7. Trust 8. Mobile Virus 9. RHD.
WAP protocol stack is designed to minimize the required bandwidth and maximize the number of wireless network
te-pes tint can deliver targeted, with additional W AP content. Multiple multiple networks networks. will be
LlMtTAT10NS
OF WAP
low
aim oftargeting
WAP prov ides small pages and Pages have to be small ands transmission speeds. The gateway itself is a security concern.
WAP PROTOCOL
stack mainly tor WAP. provide
STACK
WAE (Wireless Application
\\..-\P protocol
CONCLUSION.
Environment
:)
Wireless
W(RELESS
MARKUP
LANGUAGE
WAP is daily need of mobile users. Using WAP it's easy tor mobile users to access internet and other networking services through mobile. It gives anyone access to an indefinite amount of information at any time and is expandable. But it is uncertain i.e. If connected then we can use it.
Application Environment (W.I\E): It is "user visible" layer with WML interpreter (Web Browser), WMLScript interpreter, Wireless Telephony Application. WML is inherited lrom H rJ\.1L, but WML is based on XML, so it is much stricter than IITML. WML is used to create pages that can be displayed in a W <\!' browser.
9
[I] [21
REFERENCES
Talukder and Yavagal.
Hill, 2005. Page
I 0:
200-259
WAP SECURITY
is very important
ARCHITECTURE
issue. W AP may have attacks [31
John Groe .. Polar Transmitters tor Wireless Communications'. "IEEE Communications ". Vol 45, No 3. September 2007, Pf': 5863 S. Radha and Niranjay August 2007,f'P:315-327
Ravindran .. Mobile Ad-hoc 0/ research ", Vol 53, No -I. JulyComputing', PP: II
I. Interception: An unauthorized will be part of this attack. 2. Modification: of this attack. 3. Fabrication: An unauthorized
and Wireless
--IEEE