● Data integrity: WTLS contains facilities to ensure that data sent between the terminal and an application server are unchanged and not corrupted.
● Privacy: WTLS contains facilities to ensure that data transmitted between the terminal and an application server is private and cannot be understood by any intermediate parties that may have intercepted the data stream.
● Authentication: WTLS contains facilities to establish the authenticity of the terminal and application server.
● Denial-of-service protection: WTLS contains facilities for detecting and rejecting data that are replayed or not successfully verifi ed. WTLS makes many typical denialof service attacks harder to accomplish and protects the upper protocol layers.
WTLS protocol is optimized for low-bandwidth bearer networks with relatively long latency. These features make it possible to certify that the sent data have not been manipulated by a third party, that privacy is guaranteed, that an author of a message can be identified, and that both parties cannot falsely deny having sent their messages.
Source of Information : Elsevier Wireless Networking Complete
0 comments: on "Wireless Transport Layer Security"
Post a Comment