Computer Science, asked by sahilmaske5377, 1 year ago

Describe three alternative approaches of providing wap end-to-end security.

Answers

Answered by ayush579
1
The first approach (Figure 6.20a) is to make use of TLS between client and server. A secure TLS session is set up between the end points. The WAP gateway acts as a TCP-level gateway and splices together two TCP connections to carry the traffic between the end points However, the TCP user data field (TLS records) remains encrypted as it passes through the gateway and so end-to-end security is maintained. Another possible approach is shown in Figure 6.20b. Here we assume that the WAP gateway acts as a simple Internet router. In this case, end-to-end security can be provided at the IP level using IPsec

Similar questions