StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Wireless PKI Security and Mobile Voting - Research Paper Example

Comments (0) Cite this document
Summary
This paper 'Wireless PKI Security and Mobile Voting' explains the components and operation of the wireless public key infrastructure technology. The paper is an analysis of wireless public key infrastructure technology. It discusses the developments in public key infrastructure (PKI) technology, the integration into mobile phones as well as wireless PKI. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Wireless PKI Security and Mobile Voting
Read Text Preview

Extract of sample "Wireless PKI Security and Mobile Voting"

Download file to see previous pages The public-key infrastructure makes it possible for the electronic authentication of users to web services, signing of documents as well as text encryption. The PKI uses certificate authorities to link user identities and respective public keys. The technology has the ability to support critical security functions including e-voting, digital signing as well as bank transactions (Tepandi, Vassiljev and Tahhirov, 2010). That may be in compliance with some requirements by certificate authorities, the PKI environment or user registration process (Chen, Mitchell, and Martin, 2009). There has been development in the technology with banks in Estonia recognizing ID-card-based PKI. Transactions beyond certain limits require authentication and authorization using the ID card. The country also applied electronic voting in their elections starting from the 2005 local elections (Tepandi, Vassiljev and Tahhirov, 2010). Although the ID-PKI technology has its advantages security wise, it poses a challenge in that it requires an ID card reader and a computer. Availability of ID-card readers may be a problem. That necessitates the use of portable gadgets and in particular mobile phones.
Phones integrate the three components that security-critical applications require. The three components are the card, the reader and the computer. The use of mobile phones for authentication and digital signing provides users easy and secure access to services. The Mobiil-ID technology in Estonia eliminates the need to have a card reader physically. Through its SIM card, it incorporates private authentication keys and digital signatures with the normal SIM card functionalities (Tepandi, Vassiljev and Tahhirov, 2010). That way, it makes it possible for personal identification and authentication via mobile phone. Mobiil-ID uses wireless PKI and the system has the ability to support mobile money transfer systems.
The stakeholders in the technology include the USIM card developers, USIM card personalization provider, USIM card logistic service providers and the WPKI management entities.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wireless PKI Security and Mobile Voting Research Paper Example | Topics and Well Written Essays - 1500 words, n.d.)
Wireless PKI Security and Mobile Voting Research Paper Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1880332-wireless-pki-security-and-mobile-voting
(Wireless PKI Security and Mobile Voting Research Paper Example | Topics and Well Written Essays - 1500 Words)
Wireless PKI Security and Mobile Voting Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1880332-wireless-pki-security-and-mobile-voting.
“Wireless PKI Security and Mobile Voting Research Paper Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1880332-wireless-pki-security-and-mobile-voting.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Wireless PKI Security and Mobile Voting

Wireless Security

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... SECURITY Wireless Security affiliation Table of Contents TECHNOLOGY INVOLVED IN WIRELESS NETWORKS 4 WIRELESS TECHNOLOGY:FUTURE TRENDS 5 COMPANIES INVOLVED IN WIRELESS TECHNOLOGY 7 REGULATORY ISSUES IN WIRELESS NETWORK 8 Piggybacking 8 Wardriving 9 Unauthorized Computer Access 9 Evil Twin Attacks 9 Wireless Sniffing 10 Shoulder Surfing 10 WIRELESS SECURITY MANAGEMENT 11 Wireless Network should be Invisible 11 Wireless Network should be renamed 11 Network Traffic should be encrypted 12 Administrator Password should be Changed 12 Online Awareness 12 Connect Using a VPN 13 Disable File Sharing 13 CONCLUSION 14 REFERENCES 14 INTRODUCTION Wireless networking offers...
12 Pages (3000 words) Research Paper

Wireless security

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... of Attackers There are many types of attackers, which intend to harm the networks. Some of the most famous types of attackers include hackers, crackers, script kiddies, spies, employees, and cyber terrorists. Selected Attacker Of all these six types of attackers, the one, which I would like to break into my network, is a hacker. The reason is that hackers break into the networks to identify the security holes present in the networks. The aim of the hackers is not to commit theft, destroy, or steal any sort of private information; rather the intention is to make the network administrators improve the security of their networks. Ciampa (2009) found that a hacker...
2 Pages (500 words) Essay

Wireless Security

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... Wireless Security Introduction Recently, wireless networking has become more affordable, available and easy to use. Wireless technology is becoming more common especially in homes where it has been greatly adopted. A wireless network involves the access of internet by computers without using any cables or wires. This method is convenient because one can work from anywhere in the house or in his business using his or her laptop. It also makes it possible to connect various computers to the internet, which does not require the use of many disorganized wires or cables as can be in wired networks (Onguardonline.gov, 2012). Wireless local area networks (WLANs) have...
7 Pages (1750 words) Research Paper

Mobile and wireless computing

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... Mobile and wireless computing Mobile and wireless computing The main two reason challenging development of softwares for wireless devices are the platforms and the size of the deployment that the developer is aiming (B'Far, 2005). These factors can be translated to simply; number of competing standards for application development on various devices and adaption of software applications to match the requirement. Let’s begin with competition within application standards of development on various devices; for a long time Nokia group using Symbian OS has dominated in this field but not anymore, there is a lot of competition from iOS, Android, HP webOS, BlackBerry,...
3 Pages (750 words) Essay

Wireless Security

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... head: WIRELESS SECURITY Wireless Security Goes Here al Affiliation Goes Here Wireless Security Introduction A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN. The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides. Bluetooth and Wi-Fi--two of the hottest...
15 Pages (3750 words) Essay

Mobile and Wireless Security

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... head: MOBILE AND WIRELESS SECURITY Mobile and Wireless Security ------------------------------------- Mobile and WirelessSecurity With awareness of the current trend of merging the phone and the PDA answer the following questions:- Q1. What risks do you see these having for corporate data A1. PDA is a mobile handheld device possessing all the capabilities of a desktop PC. Cellular phone provides telephony and short messaging services with added facilities like web-browsing, video, camera etc. Smartphone is device, which combines both, and is thus becoming fast popular. Since all these devices work on wireless media, obvious vulnerabilities exist. The clients or ...
5 Pages (1250 words) Essay

Wireless security

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable. The activities performed by user on the internet can be both c...
2 Pages (500 words) Essay

Wireless and Mobile Technologies

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... Study 2: Wireless and Mobile Technologies Case Study 2: Wireless and Mobile Technologies Thecompetitive climate in the commerce industry prompts companies to research on valuable ways to connect with the target customers. Computing has become undeniable option where firms can use mobile and wireless technologies to attract and retain customers. Wireless and mobile technologies are used for a variety of ways to boost business efficiency and organization implement or install important systems for both wireless and mobile technologies functions. One of the leading firms in the use of the technologies is the Delta Airlines. The primary objective of this discussion...
5 Pages (1250 words) Case Study

Wireless and Mobile Technologies

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... and Mobile Technologies Wireless technologies are communication signals that are sent without the use of cables or wires. This includes cellular communication, the use of wireless computer accessories, networking between computers and wireless adapters (Information Resources Management Association, 2012). The wireless technologies make use of electromagnetic waves to aid the transfer of communication signals via the air (Kyriazakos, Soldatos, & Karetsos, 2008). Mobile technologies, on the other hand, refer to technological devices that are movable, most of which are wireless. One of the ways that organizations use wireless technologies to improve business effici...
3 Pages (750 words) Case Study

Security Issues in Wireless Mobile Communication

...Wireless PKI Security and Mobile Voting... Wireless PKI Security and Mobile Voting... Issues in Wireless Mobile Communication Wireless mobile communications have become crucial in the current world more than it was before. Information knowledge and access forms a vital difference between failure and success. We are beginning to observe that wireless mobile communications are becoming essential in our daily lives and its application is in a number of areas. An area of interest is in the security threat that comes up as a result of wireless mobile communication technology. Mobile communication exposes its users to the violation of their privacy since the information might be shared without their consent. It poses a threat and risk to the users...
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Wireless PKI Security and Mobile Voting for FREE!

Contact Us