Skip to main content
Log in

Toward secure and private service discovery anywhere anytime

  • Research Article
  • Published:
Frontiers of Computer Science in China Aims and scope Submit manuscript

Abstract

With the advances in and convergence of Internet technologies, embedded computers, and wireless communication, computing devices have become part of our daily life. Hand-held devices and sensors with wireless connections create opportunities for many new nomadic applications. Service discovery is an essential component for cognitive science to discover existing network services just-in-time. Unlike many other approaches, we propose a service discovery model supporting nomadic users and services in public environments. Our model emphasizes secure and private service discovery in such environments. Location sensing is integrated for location dependent service discovery and is used to lessen service discovery network infrastructure requirements. We analyze the system performance and show our formal verification of the protocols. Our implementation shows that our model is feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Halperin D, Heydt-Benjamin T S, Ransford B, et al. Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, 2008

  2. Kindberg T, Fox A. System software for ubiquitous computing. IEEE Pervasive Computing/IEEE Computer Society and IEEE Communications Society, 2002, 1(1)70–81

    Google Scholar 

  3. Zhu F, Mutka M, Ni L. Service discovery in pervasive computing environments. IEEE Pervasive Computing/IEEE Computer Society and IEEE Communications Society, 2005, 4(4): 81–90

    Google Scholar 

  4. Bluetooth SIG. Specification of the Bluetooth System - Core. 2001

  5. Nidd M. Service discovery in DEAPspace. IEEE Personal Communications, 2001, (August): 39–45

  6. Adjie-Winoto W, Schwartz E, Balakrishnan H, et al. The design and implementation of an intentional naming system. In: Proceedings of 17th ACM Symposium on Operating Systems Principles (SOSP’99). Kiawah Island, SC, 1999

  7. Balazinska M, Balakrishnan H, Karger D. INS/Twine: a scalable peer-to-peer architecture for intentional resource discovery. In: Proceedings of Pervasive 2002-International Conference on Pervasive Computing. Zurich, Switzerland: Springer-Verlag, 2002

    Google Scholar 

  8. Sun Microsystems, Jini Technology Core Platform Specification. 2003

  9. Salutation Consortium, Salutation Architecture Specification. 1999

  10. Czerwinski S, Zhao B Y, Hodes T D, et al. An architecture for a secure service discovery service. In: Proceedings of 5th Annual International Conference on Mobile Computing and Networks (MobiCom’99). Seattle, WA, 1999

  11. Guttman E, Perkins C, Veizades J, et al. Service Location Protocol Version 2. 1999

  12. Microsoft Corporation. Universal Plug and Play Device Architecture. Microsoft Co, 2000

  13. Ververidis C, Polyzos G. Service discovery for mobile Ad Hoc networks: a survey of issues and techniques. IEEE Communications Surveys and Tutorials, 2008, 10(3): 30–45

    Article  Google Scholar 

  14. Ellison C. Home Network Security. Intel Technology Journal, 2002, 6(4): 37–48

    Google Scholar 

  15. Zhu F, Mutka M, Ni L. A private, secure and user-centric information exposure model for service discovery protocols. IEEE Transactions on Mobile Computing, 2006, 5(4): 418–429

    Article  Google Scholar 

  16. Weiser M. The computer for the 21st century. Scientific American, 1991, 265(3): 66–75

    Article  Google Scholar 

  17. Want R, Hopper A, Falcão V, Gibbons J. The active badge location system. ACM Transactions on Information Systems, 1992, 10(1): 91–102

    Article  Google Scholar 

  18. Hightower J, Borriello G. Location systems for ubiquitous computing. Computer, 2001, 34(8): 57–66

    Article  Google Scholar 

  19. Ward A. Sensor-Driven Computing, in Corpus Christi College. Cambridge: University of Cambridge, 1998

    Google Scholar 

  20. Ni L M, Liu Y, Lau Y C, Patil A P. LANDMARC: indoor location sensing using active RFID. Wireless Networks, 2004, 10(6): 701–710

    Article  Google Scholar 

  21. Kindberg T, Barton J, Morgan J, et al. People, places, things: web presence for the real world. ACM MONET, 2002, 7(5): 365–376

    MATH  Google Scholar 

  22. Burnside M, Clarke D, Mills T, et al. Proxy-based security protocols in networked mobile devices. In: Proceedings of 17th ACM Symposium on Applied Computing. Madrid, Spain, 2002

  23. Sun Microsystems. Jini™ Technology Surrogate Architecture Specification. Sun Microsystems, 2001

  24. Langheinrich M. A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002. Göteborg, Sweden, 2002

  25. Menezes A, Oorschot P V, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1996, 816

  26. Stallings W. Cryptography and Network Security: Principles and Practice. 5th ed. Prentice Hall, 2010

  27. Lloyd S, Adams C, Kent S. Understanding Public-Key Infrastructure: Concept, Standards, and deployment considerations. New Riders, 1999

  28. Burrows M, Abadi M, Needham R. A Logic of Authentication. ACM Transactions on Computer Systems. 1990

  29. Gura N, Patel A, Wander A, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems. Cambridge, MA, 2004

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Zhu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhu, F., Mutka, M., Bivalkar, A. et al. Toward secure and private service discovery anywhere anytime. Front. Comput. Sci. China 4, 311–323 (2010). https://doi.org/10.1007/s11704-010-0389-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-010-0389-4

Keywords

Navigation