| The combination of the wireless communication technology and the internet technology has accelerated the application of the mobile network. With the continuously developing of the mobile network, the security of the mobile network has been more and more concerned, and security is the key factor for the success of the mobile network.PKI technology adopts certificate which is managed by the Trusted Third Part manage public key. We can use certificate in the internet to realize encryption and authentication of information transmission, and to guarantee the confidentiality, integrity, authentication and non-repudiation of information transmission. The design principium and the system structure of the PKI can also be applied to the mobile network, but must be optimized according to the characteristics of mobile network.This paper is organized into four major sections. The first section is an introduction of mobile network, In this section we expound the application, character and the security of the mobile network. The second section mainly introduces the main conception of PKI, including the advantage of PKI technology, the basic principle and the system structure of the PKI. The third section mainly introduces some interrelated technology, including WAP technology, WTLS protocol, WPKI and WIM. In this section, we discuss the main conception of WAP, including the network framework and the architecture of the protocol stacks of WAP. We discuss the handshake procedures and key-exchange mode of the Wireless Transport Layer Security (WTLS), and modify it in order to make it work better in the wireless network. The fourth section mainly discusses the WPKI, including the system design, the implement and the application of WPKI, the definition of the Certificate Application Type and the Certificate Templet. In this section, we give the function that includes the certificate management, the certificate application, CRL issue etc.The research and the design of WPKI and the simulation of WTLS protocol have been done, we are doing the testing and analysis. These research and simulation illuminate that the results of the works are valid and usefully. |