Download PDF

Transcript
Installing and Configuring Oracle Application Server Wireless Security
Figure 10–4
Wireless LANs and Other HTTP-Based Devices
Without HTTPS security at the application layer, wireless LANs are insecure even
with the use of the Wired Equivalent Privacy (WEP) protocol, a protocol operating
at the data link layer designed to protect communication but which has been shown
to be insecure. Therefore, wireless networks that depend solely on WEP for privacy
are found to be vulnerable to "war-driving", an attack where the eavesdropper
’drives by’ with a wireless receiver to break WEP security and decode wireless
information.
Figure 10–5
Wireless Application Protocol (WAP)
Security in the Wireless Application Protocol (WAP) is currently specified in the
WTLS (Wireless Transport Layer Security) protocol. Similar in design to SSL (TLS),
but optimized for bandwidth and power, WTLS provides privacy from the wireless
device to the WAP gateway, allowing for server authentication and mutual
authentication modes.
WAP has been widely criticized by the security sector on what is commonly called
the ’WAP gap’, which breaks end-to-end communication data privacy. The WAP
device communicates with the WAP gateway through WTLS (the WAP pictured in
Figure 10–5) and the WAP gateway, in turn, communicates with the application
Wireless Security
10-15