Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2002, Vol. 19 ›› Issue (3): 324-333.DOI: 10.7523/j.issn.2095-6134.2002.3.015

Previous Articles     Next Articles

Key Technologies in Securities of Wireless Electric Business

WU Wen-Ling   

  1. Engineering Research Center for Information Security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080
  • Received:2002-06-06 Online:2002-05-18

Abstract:

This paper firstly presents a briefly survey on the security technologies in wireless communications. Then we focus on some important protocols which will be used in WPKI, especially the WEP algorithm in IEEE 802.11 and the Wireless Transport Layer Security (WTLS) in Wireless Application Protocol (WAP). We study realizations of these two protocols, compare their security features, and discuss their potential advances in applications.

Key words: wireless LAN, wired equivalent privacy(WEP), wireless transport layer security(WTLS)

CLC Number: