Abstract
This article describes a protocol designed to secure a connectionless communication channel between a mobile computer and a server. Specifically, the protocol checks that all messages have been delivered in the correct order to the correct destination, and a received message is the message that was sent.
The protocol provides automatic authentication, integrity, and confidentiality on a communication link between two peers, specifically a mobile computer and a server. The protocol is simplified by the fact that key distribution is almost a null process because only two entities are involved, and those entities can at times communicate in a secure environment. A prototype is being built using a laptop PC with mobile phone as the mobile and a PC with modem as the server.
Naturally, the protocol is also applicable to connection-oriented channels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ITU, Directory - authentication framework, Recommendation X.509.
Bruce Schneier. Applied Cryptography,Wiley, second edition (1996).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media New York
About this chapter
Cite this chapter
Proudler, G., Harvey, I. (1997). Security for a Connectionless Peer-to-Peer Link. In: Goodman, D.J., Raychaudhuri, D. (eds) Mobile Multimedia Communications. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-0151-4_18
Download citation
DOI: https://doi.org/10.1007/978-1-4899-0151-4_18
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-0153-8
Online ISBN: 978-1-4899-0151-4
eBook Packages: Springer Book Archive