This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: "Wireless Transport Layer Security" – news · newspapers · books · scholar · JSTOR (February 2024) (Learn how and when to remove this message)

Wireless Transport Layer Security (WTLS) is a security protocol, part of the Wireless Application Protocol (WAP) stack.[1] It sits between the WTP and WDP layers in the WAP communications stack.[2]

Overview

WTLS is derived from TLS. WTLS uses similar semantics adapted for a low bandwidth mobile device.[2] The main changes are:

WTLS has been superseded in the WAP Wireless Application Protocol 2.0 standard by the End-to-end Transport Layer Security Specification.

Security

WTLS uses cryptographic algorithms and in common with TLS allows negotiation of cryptographic suites between client and server.

Algorithms

Due to the additional power and bandwidth requirements imposed by wireless devices, only a subset of algorithms supported by TLS are viable.[3] An incomplete list:

Security criticisms

Interoperability

As mentioned above the client and server negotiate the cryptographic suite. This happens when the session is started, briefly the client sends a list of supported algorithms and the server chooses a suite, or refuses the connection. The standard does not mandate support of any algorithm. An endpoint (either client or server) that needs to be interoperable with any other endpoint may need to implement every algorithm (including some covered by intellectual property rights).

References

  1. ^ Bakalov, Rudy (September 2000). "Introduction to WAP's Wireless Transport Layer Security". Information Security Technical Report. 5 (3). Elsevier: 15–22. doi:10.1016/S1363-4127(00)03003-X.
  2. ^ a b Nichols, Randall K.; Lekkas, Panos C. (2002). "Wireless Transport Layer Security (WTLS)". Wireless Security: Models, Threats, and Solutions. McGraw Hill Professional. ISBN 978-0-07-138038-6.
  3. ^ Sklavos, N.; Kitsos, P.; Papadopoulos, K.; Koufopavlou, O. (April 2006). "Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security". The Journal of Supercomputing. 36 (1). Springer: 33–50. doi:10.1007/s11227-006-3549-4.

See also