Description
Wireless Transport Layer Security (WTLS) is a security protocol defined within the Wireless Application Protocol (WAP) architecture, specifically designed to operate over bearer services with potentially high latency and low bandwidth. It is functionally analogous to the Transport Layer Security (TLS) protocol used on the wired Internet but is optimized for the constraints of mobile networks and devices. WTLS operates at the transport layer of the WAP protocol stack, sitting above the Wireless Datagram Protocol (WDP) and below the Wireless Session Protocol (WSP). Its primary role is to establish a secure communication channel between a WAP client (e.g., a mobile phone browser) and a WAP gateway or server, ensuring the confidentiality, integrity, and authenticity of data exchanged.
The protocol operates in several distinct phases: the handshake phase, the change cipher spec phase, and the record protocol phase. During the handshake, the client and server negotiate cryptographic algorithms, authenticate each other (using certificates or pre-shared keys), and establish shared secret keys. WTLS supports various cryptographic suites, including those based on RSA and Elliptic Curve Cryptography (ECC), with ECC being particularly favored for its efficiency on resource-constrained devices. Following a successful handshake, the change cipher spec message signals the switch to the newly negotiated cipher suite. Subsequently, the record protocol takes over, responsible for fragmenting, compressing (optionally), applying a Message Authentication Code (MAC), encrypting the data, and transmitting it over the underlying WDP transport.
Key architectural components of WTLS include its stateful connection management, support for datagram and connection-oriented transports, and mechanisms to handle packet loss and reordering common in wireless links. It provides several classes of service (WTLS Class 1, 2, and 3) offering different levels of security, from simple encryption to mutual authentication with non-repudiation. The protocol also includes features like optimized handshakes (abbreviated handshakes for session resumption) and explicit sequence numbers to counter replay attacks. Its integration into the WAP stack meant it had to interoperate with the WAP gateway, which typically performed protocol translation between the WTLS-secured wireless domain and the TLS-secured Internet domain, a point that introduced specific security considerations regarding the termination of encryption at the gateway.
Purpose & Motivation
WTLS was created to address the critical need for security in the burgeoning market of mobile data services enabled by the Wireless Application Protocol (WAP) in the late 1990s and early 2000s. The standard Internet security protocol, TLS (and its predecessor SSL), was designed for relatively stable, high-bandwidth wired connections and was computationally intensive, making it unsuitable for the constrained environment of early mobile phones with limited processing power, memory, and battery life, operating over narrowband, high-latency wireless channels like GSM Circuit Switched Data or SMS.
The protocol solved the problem of providing end-to-end security assurances—confidentiality, data integrity, and authentication—for applications like mobile banking, e-commerce, and corporate access, where sensitive data was transmitted. It enabled service providers to offer trusted services over public wireless networks. A key motivation was to create a security layer that could withstand the specific threats of the wireless environment, such as radio link interception and the higher potential for packet loss, without imposing prohibitive overhead. By defining a tailored protocol, 3GPP and the WAP Forum allowed the mobile ecosystem to deploy secure services years before handsets and networks were powerful enough to run full Internet TLS stacks efficiently.
Key Features
- Optimized handshake protocol with support for abbreviated handshakes to reduce latency and overhead
- Support for multiple cryptographic suites including efficient Elliptic Curve Cryptography (ECC)
- Provision of different security service classes (Class 1, 2, and 3) for flexible implementation
- Datagram transport support with explicit sequence numbers to prevent replay attacks over unreliable links
- Optional data compression at the record layer to save bandwidth
- Stateful connection management allowing for secure session suspension and resumption
Evolution Across Releases
Introduced the initial WTLS protocol as part of the WAP 1.x standards. Defined the core architecture with handshake, change cipher spec, and record protocols. Established support for RSA and ECC-based cipher suites, datagram transport, and the three classes of security service to cater to different application needs and device capabilities.
Defining Specifications
| Specification | Title |
|---|---|
| TS 21.905 | 3GPP TS 21.905 |
| TS 23.057 | 3GPP TS 23.057 |
| TS 23.140 | 3GPP TS 23.140 |
| TS 24.109 | 3GPP TS 24.109 |
| TS 31.113 | 3GPP TR 31.113 |