Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.6.2754

A Study on the Effective WTLS Processor Design adapted in RFID/USN Environment  

Lee, Seon-Keun (Faculty of Materials & Chemical Engineering, Chonbuk National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.6, 2011 , pp. 2754-2759 More about this Journal
Abstract
With information communications and RFID/USN environments merged wire/wireless networks are generalized. In this viewpoint, WAP is used by communication protocol for the data communication in the field of wireless environment. WTLS developed for the secure communications optimize TLS adapted wireless environment in the TCP/IP internet protocol. But WTLS denote WAP security problem, end-to-end problem, and power consumption, etc. Therefore in this paper we proposed WTLS cryptographic algorithm eliminated WTLS disadvantages. Proposed algorithm solved power consumption, calculated complexity, and security problems because it is not unique but hybrid form.
Keywords
RFID/USN; WAP; cryptographic; WTLS; TLS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 O. Goldreich, "Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme", In Proceeding CRYPTO'86, Lecture Notes in Computer Science No. 263, Springer-verlag, pp. 104-110, 1987.
2 O. Goldreich, L. A. Levin, "A Hard-core Predicate for All One-Way Functions", Proceedings of the 21st ACM Symposium on Theory of Computing, pp. 25-32, 1989.
3 S. Goldwasser, S. Micali, R. L. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack", SIAMJ, On Computing, Vol. 17, No. 2, pp. 281-308, 1988.   DOI
4 R. Lmpagliazzo, M. Naor, "Efficient cryptographic schemes probably as secure as subset sum", In 30th Annual Symposium on Foundations of Computer Science, IEEE. pp. 236-241, 1989
5 R. J. McEliece, "A Public-key Cryptosystem based on Algebraic Coding Theory", DSN Progress Report 42-44, Jet Propulsion laboratory.
6 M. Naor, M. yung, "Universal One-Way Hash Functions and their Cryptographic Applications", In Proceeding 21st ACM Symposium on Theory on Computing, pp. 33-43, 1989.