Font Size: a A A

Research Of Security In Mobile Applications Based On J2ME Platform

Posted on:2011-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:W FangFull Text:PDF
GTID:2178360302473576Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the information society, with the developing of mobile communication technology and the increasing popularity of mobile terminals, as well as the rising of hardware and software performance, it makes expanding of the field of mobile applications. At the same time, when people make full use of the convenience of mobile applications, they also put forward higher requirements for application security. As main development platform of mobile application, J2ME takes up the absolute superiority because of cross-platform, easy-to-transplant, little space occupied and provides many APIS to support software development of mobile application. However, there was no API that can be used to meet the security needs of the applications, such as encryption and decryption API,sign and verify API and so on, which makes it imminent to meet security requirement of application.In order to meet the security needs of the application, developers of mobile application must be able to access to cryptographic algorithms in the program level. The task of this paper is to use of the encryption and decryption technologies based on J2ME platform for improve the support to security of mobile applications.Firstly, it gives a general overview of the architecture of J2ME and the MIDP Programming and introduces the security of mobile applications. Secondly, systematically explore the security mechanisms and the effectiveness of security model in wireless mobile applications. Particularly made an in-depth analysis of a variety of encryption algorithms, and introduced the Bouncy Castle cryptographic toolkit introduced into the J2ME development tool package. It provides the cryptography algorithm for the client so as to enhance the support to security of the mobile application. In addition, it briefly introduced that ensure wireless network security mechanisms and technical measures. Then, there is a detailed analysis of the current J2ME platform for the support to security of mobile applications. By using similar authentication methods to HTTP digest authentication and encryption techniques in mobile applications based on MIDP2.0, we draw some conclusions that J2ME platform has less supportive for the application security: the use of HTTP protocol would bring some security issues,mobile information device exists potential security threats and so on.Finally, a new type of encryption algorithm-chaotic encryption algorithm was transplanted to the J2ME platform. What's more, give a chaotic encryption algorithm based on J2ME platform design plan and realize the simulation result.
Keywords/Search Tags:J2ME, Mobile Application, Security, Chaos Encryption
PDF Full Text Request
Related items