Secure Service Discovery based on Trust Management for ad-hoc Networks

Abstract: In ad-hoc networks, mobile devices communicate via wireless links with-out the aid of any fixed networking infrastructure. These devices must be able todiscover services dynamically and share them safely, taking into account ad-hoc net-works requirementssuchas limited processing and communication power, decentralisedmanagement, and dynamic network topology, among others. Legacy solutions fail inaddressing these requirements.In this paper, we propose a service discovery protocol with security features, the SecurePervasive Discovery Protocol. SPDP is a fully distributed protocol in which servicesofferedbydevicescanbediscoveredbyothers,withoutacentralserver.Itisbasedonananarchy trust model, which provides location of trusted services, as well as protectionof confidential information, secure communications, or access control.Key Words: ad-hoc networks, service discovery protocol, security, trustCategory: C.2.2, C.4 1 Introduction Recent advances in microelectronic and wireless technologies have fostered theproliferation of small devices with limited communication and processing power.They are what are known as “pervasive systems”. Personal Digital Assistants(PDAs) and mobile phones are the more “visible” of these kinds of devices,but there are many others that surround us, unobserved. For example, todaymost household appliances have embedded microprocessors. Each one of thesesmall devices offers a specific service to the user, but thanks to their capacityfor communication, in the near future they will be able to collaborate with eachother to build up more complex services. In order to achieve this, devices in such“ad-hoc”networksshould dynamicallydiscoverand shareservices between themwhen they are close enough.In ad-hoc networks composed of limiteddevices, it is very important to min-imise the total number of transmissions, in order to reduce battery consumptionof the devices. It is also important to implement mechanisms to detect, as soonas possible, both the availability and unavailability of services produced when

[1]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[2]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[3]  Charles E. Perkins,et al.  Service Location Protocol , 1997, RFC.

[4]  Svein J. Knapskog,et al.  A metric for trusted systems , 1998 .

[5]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[6]  Michel Barbeau,et al.  Modeling and Performance Analysis of Service Discovery Strategies in Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[7]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[8]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[9]  Young-Bae Ko,et al.  A Hybrid Service Discovery for Improving Robustness in Mobile Ad Hoc Networks , 2004 .

[10]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[11]  Timothy W. Finin,et al.  GSD: a novel group-based service discovery protocol for MANETS , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[12]  Abdelsalam Helal,et al.  Konark: a system and protocols for device independent, peer-to-peer discovery and delivery of mobile services , 2003, IEEE Trans. Syst. Man Cybern. Part A.

[13]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[14]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[16]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.