Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2010, Vol. 4 Issue (3) : 311-323    https://doi.org/10.1007/s11704-010-0389-4
Research articles
Toward secure and private service discovery anywhere anytime
Feng ZHU1,Anish BIVALKAR1,Abdullah DEMIR1,Yue LU1,Chockalingam CHIDAMBARM1,Matt MUTKA2,
1.Department of Computer Science, University of Alabama in Huntsville, Huntsville, AL 35816-3416, USA; 2.Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48824, USA;
 Download: PDF(297 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract With the advances in and convergence of Internet technologies, embedded computers, and wireless communication, computing devices have become part of our daily life. Hand-held devices and sensors with wireless connections create opportunities for many new nomadic applications. Service discovery is an essential component for cognitive science to discover existing network services just-in-time. Unlike many other approaches, we propose a service discovery model supporting nomadic users and services in public environments. Our model emphasizes secure and private service discovery in such environments. Location sensing is integrated for location dependent service discovery and is used to lessen service discovery network infrastructure requirements. We analyze the system performance and show our formal verification of the protocols. Our implementation shows that our model is feasible.
Keywords service discovery      privacy      security      network protocol      location aware      
Issue Date: 05 September 2010
 Cite this article:   
Feng ZHU,Abdullah DEMIR,Chockalingam CHIDAMBARM, et al. Toward secure and private service discovery anywhere anytime[J]. Front. Comput. Sci., 2010, 4(3): 311-323.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-010-0389-4
https://academic.hep.com.cn/fcs/EN/Y2010/V4/I3/311
Halperin D, Heydt-Benjamin T S, Ransford B, et al. Pacemakers and implantablecardiac defibrillators: software radio attacks and zero-power defenses. In: Proceedings of IEEE Symposium on Security andPrivacy, Oakland, California, 2008
Kindberg T, Fox A. System softwarefor ubiquitous computing. IEEE Pervasive Computing/IEEE Computer Society and IEEE Communications Society, 2002, 1(1)70–81

doi: 10.1109/MPRV.2002.993146
Zhu F, Mutka M, Ni L. Service discovery in pervasive computing environments. IEEE Pervasive Computing/IEEE Computer Societyand IEEE Communications Society, 2005, 4(4): 81–90

doi: 10.1109/MPRV.2005.87
Bluetooth SIG. Specification of the Bluetooth System – Core. 2001
Nidd M. Service discovery in DEAPspace. IEEE Personal Communications, 2001, (August): 39–45

doi: 10.1109/98.944002
Adjie-Winoto W, Schwartz E, Balakrishnan H, et al. The design and implementationof an intentional naming system. In: Proceedings of 17th ACM Symposiumon Operating Systems Principles (SOSP ’99). Kiawah Island, SC, 1999
Balazinska M, Balakrishnan H, Karger D. INS/Twine: a scalable peer-to-peerarchitecture for intentional resource discovery. In: Proceedings ofPervasive 2002-International Conference on Pervasive Computing. Zurich, Switzerland: Springer-Verlag, 2002
Sun Microsystems, Jini Technology Core Platform Specification. 2003
Salutation Consortium, Salutation Architecture Specification. 1999
Czerwinski S, Zhao B Y, Hodes T D, et al. An architecture for a secureservice discovery service. In: Proceedings of 5th Annual International Conference on Mobile Computing and Networks(MobiCom’99). Seattle, WA, 1999
Guttman E, et al. Service Location Protocol. Version 2. 1999
Microsoft Corporation. Universal Plug and Play Device Architecture. Microsoft Co, 2000
Ververidis C, Polyzos G. Service discovery for mobile Ad Hoc networks: a survey of issues and techniques. IEEE Communications Surveys and Tutorials, 2008, 10(3): 30–45

doi: 10.1109/COMST.2008.4625803
Ellison C. Home Network Security. Intel Technology Journal, 2002, 6(4): 37–48
Zhu F, Mutka M, Ni L. A private, secure and user-centric information exposuremodel for service discovery protocols. IEEE Transactions on Mobile Computing, 2006, 5(4): 418–429

doi: 10.1109/TMC.2006.1599409
Weiser M. The computer for the 21st century. Scientific American, 1991, 265(3): 66–75

doi: 10.1038/scientificamerican0991-94
Want R, Hopper A, Falc?o V, Gibbons J. The active badge location system. ACM Transactions on Information Systems, 1992, 10(1): 91–102

doi: 10.1145/128756.128759
Hightower J, Borriello G. Location systems for ubiquitous computing. Computer, 2001, 34(8): 57–66

doi: 10.1109/2.940014
Ward A. Sensor-Driven Computing, in Corpus Christi College. Cambridge, UK: University of Cambridge, 1998
Ni L M, Liu Y, Lau Y C, Patil A P. LANDMARC: indoor location sensing using active RFID. Wireless Networks, 2004, 10(6): 701–710

doi: 10.1023/B:WINE.0000044029.06344.dd
Kindberg T, Barton J, Morgan J, et al. People, places,things: web presence for the real world. ACM MONET, 2002, 7(5): 365–376
Burnside M, Clarke D, Mills T, et al. Proxy-based security protocols in networked mobile devices. In: Proceedings of 17th ACM Symposium on Applied Computing. Madrid, Spain, 2002
Sun Microsystems. Jini? Technology Surrogate Architecture Specification. Sun Microsystems, 2001
Langheinrich M. A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002. G?teborg,Sweden, 2002
Menezes A, Oorschot P v, Vanstone S A. Handbook of AppliedCryptography. CRC Press, 1996, 816

doi: 10.1201/9781439821916
Stallings W. Cryptography and Network Security: Principles and Practice. et al. Prentice Hall, 2010
Lloyd S, Adams C, Kent S. Understanding Public-Key Infrastructure:Concept, Standards, and deployment considerations. New Riders, 1999
Burrows M, Abadi M, Needham R. A Logic of Authentication. ACM Transactions on Computer Systems. 1990
Gura N, Patel A, Wander A, et al. Comparing elliptic curve cryptographyand RSA on 8-bit CPUs. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems. Cambridge, MA, 2004
[1] Bin GUO, Yasan DING, Yueheng SUN, Shuai MA, Ke LI, Zhiwen YU. The mass, fake news, and cognition security[J]. Front. Comput. Sci., 2021, 15(3): 153806-.
[2] Abhishek MAJUMDAR, Arpita BISWAS, Atanu MAJUMDER, Sandeep Kumar SOOD, Krishna Lal BAISHNAB. A novel DNA-inspired encryption strategy for concealing cloud storage[J]. Front. Comput. Sci., 2021, 15(3): 153807-.
[3] Zeli WANG, Hai JIN, Weiqi DAI, Kim-Kwang Raymond CHOO, Deqing ZOU. Ethereum smart contract security research: survey and future research opportunities[J]. Front. Comput. Sci., 2021, 15(2): 152802-.
[4] Je Sen TEH, Weijian TENG, Azman SAMSUDIN, Jiageng CHEN. A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators[J]. Front. Comput. Sci., 2020, 14(6): 146405-.
[5] Xiaochen LIU, Chunhe XIA, Tianbo WANG, Li ZHONG, Xiaojian LI. A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service[J]. Front. Comput. Sci., 2020, 14(6): 146808-.
[6] Yanwei ZHOU, Bo YANG. Practical continuous leakage-resilient CCA secure identity-based encryption[J]. Front. Comput. Sci., 2020, 14(4): 144804-.
[7] Yudi ZHANG, Debiao HE, Mingwu ZHANG, Kim-Kwang Raymond CHOO. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm[J]. Front. Comput. Sci., 2020, 14(3): 143803-.
[8] Yi LIU, Tian SONG, Lejian LIAO. TPII: tracking personally identifiable information via user behaviors in HTTP traffic[J]. Front. Comput. Sci., 2020, 14(3): 143801-.
[9] Xingyue CHEN, Tao SHANG, Feng ZHANG, Jianwei LIU, Zhenyu GUAN. Dynamic data auditing scheme for big data storage[J]. Front. Comput. Sci., 2020, 14(1): 219-229.
[10] Tianyong WU, Xi DENG, Jun YAN, Jian ZHANG. Analyses for specific defects in Android applications: a survey[J]. Front. Comput. Sci., 2019, 13(6): 1210-1227.
[11] Yan ZHU, Khaled RIAD, Ruiqi GUO, Guohua GAN, Rongquan FENG. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain[J]. Front. Comput. Sci., 2019, 13(6): 1182-1197.
[12] Xuan LI, Jin LI, Siuming YIU, Chongzhi GAO, Jinbo XIONG. Privacy-preserving edge-assisted image retrieval and classification in IoT[J]. Front. Comput. Sci., 2019, 13(5): 1136-1147.
[13] Shuai ZHANG, Xinjun MAO, Fu HOU, Peini LIU. A field-based service management and discovery method in multiple clouds context[J]. Front. Comput. Sci., 2019, 13(5): 976-995.
[14] Sa WANG, Yiwen SHAO, Yungang BAO. Practices of backuping homomorphically encrypted databases[J]. Front. Comput. Sci., 2019, 13(2): 220-230.
[15] Ning WANG, Yu GU, Jia XU, Fangfang LI, Ge YU. Differentially private high-dimensional data publication via grouping and truncating techniques[J]. Front. Comput. Sci., 2019, 13(2): 382-395.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed