End-to- end security solutions for WLAN: A performance analysis for the underlying encryption algorithms in the lightweight devices

Ezedin S. Barka, Emad Eldin Mohamed, Kadhim Hayawi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

The advances in the wireless technology, represented by the improved computational capabilities of third generation (3G) and fourth generation (4G) wireless devices and the wider bandwidth wireless networks, make it possible to support a variety of security-sensitive applications such as m-banking and m-commerce. This, however, requires increasingly robust End-to-End security solutions. The contribution of this paper is twofold. First, it presents a design and an implementation of a light weight application-level security solution for handheld devices in wireless LAN. Second, it analyzes the impact of the processing power, time, and memory on the performance of two of the widely known encryption algorithms - RC4 and AES - used by the lightweight handheld devices in the wireless network environment. The work in this paper uses pure Java components to provide endto-end client authentication and data confidentiality and integrity between wireless J2ME-based clients and J2ME-based servers.

Original languageEnglish
Title of host publicationIWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference
Pages1295-1300
Number of pages6
DOIs
Publication statusPublished - 2006
EventIWCMC 2006 - 2006 International Wireless Communications and Mobile Computing Conference - Vancouver, BC, Canada
Duration: Jul 3 2006Jul 6 2006

Publication series

NameIWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference
Volume2006

Other

OtherIWCMC 2006 - 2006 International Wireless Communications and Mobile Computing Conference
Country/TerritoryCanada
CityVancouver, BC
Period7/3/067/6/06

Keywords

  • AES
  • End -to- end wireless security
  • J2ME
  • RC4
  • SSL/TLS

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Networks and Communications
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'End-to- end security solutions for WLAN: A performance analysis for the underlying encryption algorithms in the lightweight devices'. Together they form a unique fingerprint.

Cite this