• Title/Summary/Keyword: Wireless Application Protocol

Search Result 333, Processing Time 0.025 seconds

An Design and Implementation of WAP(Wireless Application Protocol) Emulator (WAP(Wireless Application Protocol) 에뮬레이터(Emulator)의 설계 및 구현)

  • 최철웅;장지산;신화종;김상국;신동규;신동일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.135-137
    • /
    • 2000
  • 무선 인터넷 시장의 급속한 발전으로 인해 컨텐츠에 대한 사용자들의 다양한 요구가 증가되고 있고, 그로인해 WML과 WML Script를 개발자가 실제와 같은 상황에서 편리하게 개발할 수 있는 환경이 필요하게 되었다. 본 논문에서는 CP(Content Provider)들이 쉽고 편리하게 WML(Wireless Markup Language) 컨텐츠(Content)를 개발, 브라우징하기 위한 WAP(Wireless Application Protocol) Emulator의 설계와 구현에 대하여 기술한다. WAP Emulator는 WML 파싱(parsing) 모듈과 인터페이스(Interface)모듈, 그리고 Data Send/Receive 모듈로 구성되며, 디코딩(Decoding)된 WML 문서를 파싱하여 브라우저로 보여준다.

  • PDF

A Split Reservation Protocol for Mobile Hosts in Wireless Networks

  • Kang, Yoo-Hwa;Suh, Young-Joo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.111-113
    • /
    • 2000
  • We discuss the problem of resource reservation, such as bandwidth, for delay sensitive application in wireless networking environment. As multimedia application is becoming a critical role of the current mobile network, the resource reservation become very important to support the real-time service. In this paper, we propose and evaluate a new resource reservation protocol, called Split Reservation Protocol, in wireless network. The simulation results show that our proposed protocol outperforms an existing protocol called MPSVP in terms of network overhead.

  • PDF

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Performance Evaluation of WSP with Capability Extension using Compression Techniques (압축 기법을 이용한 WSP의 기능 확장과 성능 평가)

  • Kim, Ki-Jo;Lee, Dong-Gun;Lim, Kyung-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.543-552
    • /
    • 2002
  • Wireless Session Protocol(WSP) which was updated and supplemented based on HyperText Transfer Protocol(HTTP) was designed by Wireless Application Protocol(WAP) forum regarding the characteristics of wireless environment. WSP improved the performance in wireless network, and introduced various facilities considering wireless environment. In this paper, we more improve the performance of WSP adding protocol message compression capability; we cail improved WSP protocol as WSP+. And, we analysis the performance of each protocol with WSP and WSP+ implementation. As a result of experiment, the capability which proposed in this paper reduced a response traffic about 45%. In $10^{-4}$ bit error rate, we also found the packet loss rate and time delay per transaction of WSP+ was improved over 40%. Finally, we found that the protocol message compression capability reduces message retransmission count in transaction layer and shorten the delay time per transaction by reducing a message size.

Analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks (무선 센서 네트워크망에서의 효율적인 키 관리 프로토콜 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.799-802
    • /
    • 2005
  • In this paper, we analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks. Wireless sensor networks have a wide spectrum of civil military application that call for security, target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resource consuming security mechanism is not possible. In this paper, we propose a cryptography key management protocol, which is based on identity based symmetric keying.

  • PDF

Analysis of Cryptography Technique on Application Layer based on WAP (WAP 기반의 Application Layer 암호화 기법 분석)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.748-751
    • /
    • 2004
  • In this paper, we discuss about wireless Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now. There are WAP(Wireless Application Protocol) and WPKI. WAP(now version 2.0) is a protocol specification for wireless communication networks. it provides an application framework and network protocols for wireless devices such as mobile telephones, PDAs and internet technologies. In this paper some analysis of security(e.g. digital signature or encryption) for wireless internet are performed.

  • PDF

Wireless Application Protocol and Its Security (무선 인터넷 프로토콜 씨큐리티)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.11a
    • /
    • pp.514-517
    • /
    • 2000
  • 본 논문에서는 사실상 무선 인터넷 프로토콜의 표준인 WAP(Wireless Application Protocol)의 구조 및 동작을 살펴보고, 안전한 통신을 위한 WTLS(Wireless Transport Security) 프로토콜 동작 및 그 취약성에 대해 논의한다. 또한 WAP 및 HTTP 상에서 안전한 유무선 통합 서비스를 위한 여러 방안을 살펴보고 결론을 유도한다.

  • PDF

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.

Application-aware Routing Protocol Selection Scheme in Wireless Mesh Network (무선 메쉬 네트워크에서의 응용 서비스 인지 라우팅 프로토콜 선택 기법)

  • Choi, Hyo-Hyun;Shon, Tae-Shik;Park, Yong-Suk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.103-110
    • /
    • 2009
  • We propose a novel routing protocol selection scheme based on the application feature in wireless mesh network. Each application has its own feature such as its packet size. For example, text messenger generates short size packets and file transfer application generates long size packets. Routing protocols in wireless mesh network discover the route with different features. Some find shortest hop routes; others find the routes consisting of high bandwidth though they have more hops. The proposed scheme selects the routing protocol by matching the feature of routing protocol and that of application. This paper shows the system that we have developed for supporting mesh routing as well as the proposed scheme and experimental results.

Equipment Management Information System Using Wireless Application Protocol (Wireless Application Protocol을 이용한 기자재 관리 정보시스템)

  • 임영문;최영두;김홍기
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.3
    • /
    • pp.129-140
    • /
    • 2000
  • Nowadays the role of information systems is getting more and more increased according to the development of information technology. In order to manage complex, various and huge data, it is vital to construct efficient information system. For this effective information system, data have properly to be stored, encoded and represented when needed. This paper presents equipment management information system using wireless application protocol. This system enables us to have remote control of data searching and data management. Also, through the technique of data mining, database resulted from this system can be utilized into expectation and analysis about life-cycle, characteristic, and failure time of equipment, pattern recognition of users, and state of movement, etc.

  • PDF