Font Size: a A A

Research On Wireless Java Security

Posted on:2006-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:J Q YangFull Text:PDF
GTID:2168360152470664Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Java, which conforms to CLDC/MIDP specification, is the focal point of J2ME application so far. Wireless Java resides in mobile information device, such as mobile phone and PDA. The common features among these devices include: small size screen, little memory, low power processor, and small bandwidth and long latency time when connecting to network, etc. Although Java technology has widely used in low-end commercial application and server-end enterprise application, and its security is been appreciated by the industry, the security mechanism used in wireless Java, which inherits from J2SE but has been simplified, when apply to the resource-constrained environment, will be skeptical. One goal of this subject is to study the effectiveness of wireless Java security mechanism and security mode. With the development of e-commerce, the m-commerce is playing important role, another goal of this subject is to discuss the wireless Java's security support for m-commerce, and the feasibility of wireless Java application when apply to e-commerce.This subject summarizes characteristics of wireless Java and defines on the basis of consulting a large number of documents related to CLDC and MIDP, and studies the security of wireless Java deeply and carefully. This subject presents a client/server application and test it in real device and the simulate environment, to verify and study wireless Java security and its feasibility for the e-commerce. The subject also give a secure method using digital signature technology, this method can enhance the security of wireless based on MIDP 1.0 in end to end environment. Through the work I've done, we can conclude: The wireless Java is secure in non end-to-end application. The wireless Java based on MIDP 2.0 can be used in e-commerce application, however, it is not suitable for real-time-like e-commerce. As for the wireless Java based on MIDP 1.0, although its Java application is not usually reliable and has certain secure threat when used in end-to-end application, in case of adopting corresponding safety measure, it can also be used in end to end application to a certain extent in which it is not too high to the safe demand. This paper also provides other deficiencies in wireless Java safe architecture, as well as provide some suggestionsThis paper divides 7 chapters altogether, chapter 1 provides the developmentand security study of wireless Java in present, as well the purpose and meaning of this subject. Chapter 2 provide the relevant concepts of J2ME and wireless Java, summarize characteristic of wireless Java, provide the accurate meaning of wireless Java. Chapter 3 introduces some network security technology related to wireless security. Chapter 4 thoroughly discusses the security mechanism and security mode in wireless Java, as well as its support for m-commerce. Chapter 5 chapter introduces the development tools and methods to configure them, especially the configure method for the cooperative work of J2ME Wireless Toolkit 2.1 and Eclipse 3.0. Chapter 6 give a Java application based on client/server, and deeply discusses the wireless security. The last chapter gives a summary of this paper.
Keywords/Search Tags:Wireless Java, J2ME, MIDP, Security, Mobile Information Device
PDF Full Text Request
Related items