|
|
Toward secure and private service discovery anywhere
anytime |
Feng ZHU1,Anish BIVALKAR1,Abdullah DEMIR1,Yue LU1,Chockalingam CHIDAMBARM1,Matt MUTKA2, |
1.Department of Computer
Science, University of Alabama in Huntsville, Huntsville, AL 35816-3416,
USA; 2.Department of Computer
Science and Engineering, Michigan State University, East Lansing,
MI 48824, USA; |
|
|
Abstract With the advances in and convergence of Internet technologies, embedded computers, and wireless communication, computing devices have become part of our daily life. Hand-held devices and sensors with wireless connections create opportunities for many new nomadic applications. Service discovery is an essential component for cognitive science to discover existing network services just-in-time. Unlike many other approaches, we propose a service discovery model supporting nomadic users and services in public environments. Our model emphasizes secure and private service discovery in such environments. Location sensing is integrated for location dependent service discovery and is used to lessen service discovery network infrastructure requirements. We analyze the system performance and show our formal verification of the protocols. Our implementation shows that our model is feasible.
|
Keywords
service discovery
privacy
security
network protocol
location aware
|
Issue Date: 05 September 2010
|
|
|
Halperin D, Heydt-Benjamin T S, Ransford B, et al. Pacemakers and implantablecardiac defibrillators: software radio attacks and zero-power defenses. In: Proceedings of IEEE Symposium on Security andPrivacy, Oakland, California, 2008
|
|
Kindberg T, Fox A. System softwarefor ubiquitous computing. IEEE Pervasive Computing/IEEE Computer Society and IEEE Communications Society, 2002, 1(1)70–81
doi: 10.1109/MPRV.2002.993146
|
|
Zhu F, Mutka M, Ni L. Service discovery in pervasive computing environments. IEEE Pervasive Computing/IEEE Computer Societyand IEEE Communications Society, 2005, 4(4): 81–90
doi: 10.1109/MPRV.2005.87
|
|
Bluetooth SIG. Specification of the Bluetooth System – Core. 2001
|
|
Nidd M. Service discovery in DEAPspace. IEEE Personal Communications, 2001, (August): 39–45
doi: 10.1109/98.944002
|
|
Adjie-Winoto W, Schwartz E, Balakrishnan H, et al. The design and implementationof an intentional naming system. In: Proceedings of 17th ACM Symposiumon Operating Systems Principles (SOSP ’99). Kiawah Island, SC, 1999
|
|
Balazinska M, Balakrishnan H, Karger D. INS/Twine: a scalable peer-to-peerarchitecture for intentional resource discovery. In: Proceedings ofPervasive 2002-International Conference on Pervasive Computing. Zurich, Switzerland: Springer-Verlag, 2002
|
|
Sun Microsystems, Jini Technology Core Platform Specification. 2003
|
|
Salutation Consortium, Salutation Architecture Specification. 1999
|
|
Czerwinski S, Zhao B Y, Hodes T D, et al. An architecture for a secureservice discovery service. In: Proceedings of 5th Annual International Conference on Mobile Computing and Networks(MobiCom’99). Seattle, WA, 1999
|
|
Guttman E, et al. Service Location Protocol. Version 2. 1999
|
|
Microsoft Corporation. Universal Plug and Play Device Architecture. Microsoft Co, 2000
|
|
Ververidis C, Polyzos G. Service discovery for mobile Ad Hoc networks: a survey of issues and techniques. IEEE Communications Surveys and Tutorials, 2008, 10(3): 30–45
doi: 10.1109/COMST.2008.4625803
|
|
Ellison C. Home Network Security. Intel Technology Journal, 2002, 6(4): 37–48
|
|
Zhu F, Mutka M, Ni L. A private, secure and user-centric information exposuremodel for service discovery protocols. IEEE Transactions on Mobile Computing, 2006, 5(4): 418–429
doi: 10.1109/TMC.2006.1599409
|
|
Weiser M. The computer for the 21st century. Scientific American, 1991, 265(3): 66–75
doi: 10.1038/scientificamerican0991-94
|
|
Want R, Hopper A, Falc?o V, Gibbons J. The active badge location system. ACM Transactions on Information Systems, 1992, 10(1): 91–102
doi: 10.1145/128756.128759
|
|
Hightower J, Borriello G. Location systems for ubiquitous computing. Computer, 2001, 34(8): 57–66
doi: 10.1109/2.940014
|
|
Ward A. Sensor-Driven Computing, in Corpus Christi College. Cambridge, UK: University of Cambridge, 1998
|
|
Ni L M, Liu Y, Lau Y C, Patil A P. LANDMARC: indoor location sensing using active RFID. Wireless Networks, 2004, 10(6): 701–710
doi: 10.1023/B:WINE.0000044029.06344.dd
|
|
Kindberg T, Barton J, Morgan J, et al. People, places,things: web presence for the real world. ACM MONET, 2002, 7(5): 365–376
|
|
Burnside M, Clarke D, Mills T, et al. Proxy-based security protocols in networked mobile devices. In: Proceedings of 17th ACM Symposium on Applied Computing. Madrid, Spain, 2002
|
|
Sun Microsystems. Jini? Technology Surrogate Architecture Specification. Sun Microsystems, 2001
|
|
Langheinrich M. A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002. G?teborg,Sweden, 2002
|
|
Menezes A, Oorschot P v, Vanstone S A. Handbook of AppliedCryptography. CRC Press, 1996, 816
doi: 10.1201/9781439821916
|
|
Stallings W. Cryptography and Network Security: Principles and Practice. et al. Prentice Hall, 2010
|
|
Lloyd S, Adams C, Kent S. Understanding Public-Key Infrastructure:Concept, Standards, and deployment considerations. New Riders, 1999
|
|
Burrows M, Abadi M, Needham R. A Logic of Authentication. ACM Transactions on Computer Systems. 1990
|
|
Gura N, Patel A, Wander A, et al. Comparing elliptic curve cryptographyand RSA on 8-bit CPUs. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems. Cambridge, MA, 2004
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|