Abstract
With the advances in and convergence of Internet technologies, embedded computers, and wireless communication, computing devices have become part of our daily life. Hand-held devices and sensors with wireless connections create opportunities for many new nomadic applications. Service discovery is an essential component for cognitive science to discover existing network services just-in-time. Unlike many other approaches, we propose a service discovery model supporting nomadic users and services in public environments. Our model emphasizes secure and private service discovery in such environments. Location sensing is integrated for location dependent service discovery and is used to lessen service discovery network infrastructure requirements. We analyze the system performance and show our formal verification of the protocols. Our implementation shows that our model is feasible.
Similar content being viewed by others
References
Halperin D, Heydt-Benjamin T S, Ransford B, et al. Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, 2008
Kindberg T, Fox A. System software for ubiquitous computing. IEEE Pervasive Computing/IEEE Computer Society and IEEE Communications Society, 2002, 1(1)70–81
Zhu F, Mutka M, Ni L. Service discovery in pervasive computing environments. IEEE Pervasive Computing/IEEE Computer Society and IEEE Communications Society, 2005, 4(4): 81–90
Bluetooth SIG. Specification of the Bluetooth System - Core. 2001
Nidd M. Service discovery in DEAPspace. IEEE Personal Communications, 2001, (August): 39–45
Adjie-Winoto W, Schwartz E, Balakrishnan H, et al. The design and implementation of an intentional naming system. In: Proceedings of 17th ACM Symposium on Operating Systems Principles (SOSP’99). Kiawah Island, SC, 1999
Balazinska M, Balakrishnan H, Karger D. INS/Twine: a scalable peer-to-peer architecture for intentional resource discovery. In: Proceedings of Pervasive 2002-International Conference on Pervasive Computing. Zurich, Switzerland: Springer-Verlag, 2002
Sun Microsystems, Jini Technology Core Platform Specification. 2003
Salutation Consortium, Salutation Architecture Specification. 1999
Czerwinski S, Zhao B Y, Hodes T D, et al. An architecture for a secure service discovery service. In: Proceedings of 5th Annual International Conference on Mobile Computing and Networks (MobiCom’99). Seattle, WA, 1999
Guttman E, Perkins C, Veizades J, et al. Service Location Protocol Version 2. 1999
Microsoft Corporation. Universal Plug and Play Device Architecture. Microsoft Co, 2000
Ververidis C, Polyzos G. Service discovery for mobile Ad Hoc networks: a survey of issues and techniques. IEEE Communications Surveys and Tutorials, 2008, 10(3): 30–45
Ellison C. Home Network Security. Intel Technology Journal, 2002, 6(4): 37–48
Zhu F, Mutka M, Ni L. A private, secure and user-centric information exposure model for service discovery protocols. IEEE Transactions on Mobile Computing, 2006, 5(4): 418–429
Weiser M. The computer for the 21st century. Scientific American, 1991, 265(3): 66–75
Want R, Hopper A, Falcão V, Gibbons J. The active badge location system. ACM Transactions on Information Systems, 1992, 10(1): 91–102
Hightower J, Borriello G. Location systems for ubiquitous computing. Computer, 2001, 34(8): 57–66
Ward A. Sensor-Driven Computing, in Corpus Christi College. Cambridge: University of Cambridge, 1998
Ni L M, Liu Y, Lau Y C, Patil A P. LANDMARC: indoor location sensing using active RFID. Wireless Networks, 2004, 10(6): 701–710
Kindberg T, Barton J, Morgan J, et al. People, places, things: web presence for the real world. ACM MONET, 2002, 7(5): 365–376
Burnside M, Clarke D, Mills T, et al. Proxy-based security protocols in networked mobile devices. In: Proceedings of 17th ACM Symposium on Applied Computing. Madrid, Spain, 2002
Sun Microsystems. Jini™ Technology Surrogate Architecture Specification. Sun Microsystems, 2001
Langheinrich M. A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002. Göteborg, Sweden, 2002
Menezes A, Oorschot P V, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1996, 816
Stallings W. Cryptography and Network Security: Principles and Practice. 5th ed. Prentice Hall, 2010
Lloyd S, Adams C, Kent S. Understanding Public-Key Infrastructure: Concept, Standards, and deployment considerations. New Riders, 1999
Burrows M, Abadi M, Needham R. A Logic of Authentication. ACM Transactions on Computer Systems. 1990
Gura N, Patel A, Wander A, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems. Cambridge, MA, 2004
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhu, F., Mutka, M., Bivalkar, A. et al. Toward secure and private service discovery anywhere anytime. Front. Comput. Sci. China 4, 311–323 (2010). https://doi.org/10.1007/s11704-010-0389-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-010-0389-4