Security Analysis of Wireless Java
نویسندگان
چکیده
This paper represents a careful study of the security aspects of Java 2 Micro-Edition (J2ME) Connected Limited Device Configuration (CLDC). This Java platform is intended for resource-constrained devices, with the purpose of expanding the range of applications available for these devices, by enabling them to run Java programs. Consequently, malicious code would pose a threat to the security and safety of the devices. The purpose of this study is to identify vulnerabilities in the platform that could be exploited by malicious code. All of this is done with the final goal of contributing to the security of the Java platform, which would make way for more growth in application development for mobile devices.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn Analysis of the Local Resources Potential to Achieve Food Security in Jombang and Probolinggo Regencies East Java Indonesia
This study aims at analyzing the characteristics of the food need in the area of Jombang and Probolinggo regencies as well as developing a model of local superiority-based policy to achieve the food security. This study employs descriptive qualitative approach. This study is carried out in eight months in March to October 2015. The respondent of the study is the governmental staff of Jombang an...
متن کاملJava-Based Wireless Identity Module
Many of today’s wireless devices apply the Wireless Application Protocol (WAP). To fully implement the security features that WAP defines, a Wireless Identity Module (WIM) is required within the client device. This paper describes a prototype WIM implementation running on a Java-based smart card and presents an evaluation of this WIM application focusing on its resource consumption and the exec...
متن کاملEnergy Analysis of Wireless Sensor Networks using RSA and ECC Encryption Method
Wireless Sensor Networks consist of sensor nodes and few powerful control mobile laptops performing activities like routing, data aggregation etc over wireless media. However such kind of environment prone great security threats due to the broadcast nature of the transmission medium. Sensor networks pose unique challenges; traditional security techniques used in traditional networks cannot be a...
متن کاملKSSL: Experiments in Wireless Internet Security
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless web" offerings. All such offerings today use a security architecture that lacks end-to-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005