Enabling Secure Discovery in a Pervasive Environment

  • Slim Trabelsi
  • Jean-Christophe Pazzaglia
  • Yves Roudier
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3934)


The pervasive computing paradigm assumes an essentially dynamic model of interaction between devices that also motivates the need to discover the services offered by previously unknown parties at an early phase of these interactions. Whereas this assumption is at the heart of many pervasive computing protocols and systems, the necessity of securing service discovery and the complexity of this task have been largely underestimated, if considered at all. This paper discusses the implications of insecure service discovery in available systems and which security objectives should be pursued. The design space for introducing security features into a specific architecture, namely registry-based discovery systems, is then explored and assessed.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zhu, F., Mutka, M., Ni, L.: Classification of Service Discovery in Pervasive Computing Environments. MSU-CSE-02-24, Michigan State university, East Lansing (2002)Google Scholar
  2. 2.
    Bussard, L., Roudier, Y.: Embedding Distance Bounding Protocols within Intuitive Interactions. In: 1st International Conference on Security in Pervasive Computing, SPC 2003, Boppard, Germany, March 12-13 (2003)Google Scholar
  3. 3.
  4. 4.
    Kagal, L.: Rei: A Policy Language for the Me-Centric Project. HP Technical Report (2002)Google Scholar
  5. 5.
  6. 6.
    Martin, D., et al.: Bringing Semantics to Web Services: The OWL-S Approach. In: Cardoso, J., Sheth, A.P. (eds.) SWSWPC 2004. LNCS, vol. 3387, pp. 26–42. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Czerwinski, S., et al.: An architecture for a Secure Service Discovery Service. In: Proceedings of Mobicom 1999, Seattle, USA (1999)Google Scholar
  8. 8.
    Almenarez, F., Campo, C.: SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks. In: 9th Open European Summer School and IFIP Workshop on Next Generation Networks, Budapest (2003)Google Scholar
  9. 9.
    Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (Percom 2003), pp. 235–242. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  10. 10.
    MOSQUITO Project IST 004636,
  11. 11.
    Ghader, M., et al.: Secure resource and service discovery in personal networks. Wireless World Research Forum Meeting #12, Canada, November 4-5 (2004)Google Scholar
  12. 12.
    Zhu, F., Mutka, M., Ni, L.: Prudent exposure: A private and user centric service discovery protocol. In: Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), Orlando, USA (2004)Google Scholar
  13. 13.
    SUN Microsystems, Jini Specifications,
  14. 14.
  15. 15.
    Garofalakis, O., et al.: Web Service Discovery Mechanisms: Looking for a Needle in a Haystack?”. In: 15th ACM Conference on Hypertext and Hypermedia (Hypertext 2004), Santa Cruz, USA (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Slim Trabelsi
    • 1
  • Jean-Christophe Pazzaglia
    • 1
    • 2
  • Yves Roudier
    • 1
  1. 1.Institut EurécomSophia AntipolisFrance
  2. 2.SAP Labs FranceMouginsFrance

Personalised recommendations