This is a Demo Server. Data inside this system is only for test purpose.
 

End-to-end security for mobile devices

dc.contributor.advisor Tuğlular, Tuğkan en
dc.contributor.author Kayayurt, Barış
dc.contributor.author Tuğlular, Tuğkan
dc.date.accessioned 2023-11-13T09:08:40Z
dc.date.available 2023-11-13T09:08:40Z
dc.date.issued 2004 en
dc.description Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2004 en
dc.description Includes bibliographical references (leaves: 120) en
dc.description Text in English; Abstract: Turkish and English en
dc.description ix, 133 leaves en
dc.description.abstract End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used in Internet, together with its predecessor, SSL protocol. By using TLS protocol in mobile world, the advantage of the proven security model of this protocol can be taken.J2ME (Java 2 Micro Edition) has been the de facto application platform used in mobile devices. This thesis aims to provide an end-to-end security protocol implementation based on TLS 1.0 specification and that can run on J2ME MIDP (Mobile Information Device Profile) environment. Because of the resource intensive public-key operations used in TLS, this protocol needs high resources and has low performance. Another motivation for the thesis is to adapt the protocol for mobile environment and to show that it is possible to use the protocol implementation in both client and server modes. An alternative serialization mechanism is used instead of the standard Java object serialization that is lacking in MIDP. In this architecture, XML is used to transmit object data.The mobile end-to-end security protocol has the main design issues of maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object-oriented architecture of the protocol implementation makes the replacement of this library with another cryptography package easier.Mobile end-to-end security protocol is tested with a mobile hospital reservation system application. Test cases are prepared to measure the performance of the protocol implementation with different cipher suites and platforms. Measured values of all handshake operation and defined time spans are given in tables and compared with graphs. en
dc.identifier.uri http://standard-demo.gcris.com/handle/123456789/3750
dc.language.iso en en_US
dc.publisher Izmir Institute of Technology en
dc.publisher Izmir Institute of Technology en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject.lcc QA76.59 .K23 2004 en
dc.subject.lcsh Mobile computing--Security measures en
dc.subject.lcsh Personal communication service systems en
dc.title End-to-end security for mobile devices en_US
dc.type Master Thesis en_US
dspace.entity.type Publication
gdc.author.institutional Kayayurt, Barış
gdc.description.department Computer Engineering en_US
gdc.description.publicationcategory Tez en_US
gdc.oaire.accepatencedate 2004-01-01
gdc.oaire.diamondjournal false
gdc.oaire.impulse 0
gdc.oaire.influence 2.9837197E-9
gdc.oaire.influencealt 0
gdc.oaire.isgreen true
gdc.oaire.keywords Computer Engineering and Computer Science and Control
gdc.oaire.keywords Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol
gdc.oaire.popularity 3.9385506E-10
gdc.oaire.popularityalt 0.0
gdc.oaire.publicfunded false
relation.isAuthorOfPublication 16066bf2-f189-4d4b-91e8-3fc6cb495163
relation.isAuthorOfPublication.latestForDiscovery 16066bf2-f189-4d4b-91e8-3fc6cb495163

Files

Collections