Secure and Private Service Discovery in Pervasive Computing Environments

In pervasive computing environments, service discovery is an essential step for computing devices to properly discover, configure, and communicate with each other. We introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. Traditional authentication approaches requires much users’ involvement. PrudentExposure encodes hundreds of authentication messages in a novel code word form. Moreover, we discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. In a challenging case, both users and service providers want the other parties to expose sensitive information first. Our model protects both users and service providers.

[1]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[2]  Raphael C.-W. Phan Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson , 2009, Cryptologia.

[3]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[4]  Lionel M. Ni,et al.  A private, secure, and user-centric information exposure model for service discovery protocols , 2006 .

[5]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[6]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[7]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[8]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[9]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[10]  David R. Karger,et al.  INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.

[11]  T. Nixon,et al.  Home networking with Universal Plug and Play , 2001 .

[12]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[13]  Lionel M. Ni,et al.  Private and Secure Service Discovery via Progressive and Probabilistic Exposure , 2007, IEEE Transactions on Parallel and Distributed Systems.

[14]  Lionel M. Ni,et al.  Service discovery in pervasive computing environments , 2005, IEEE Pervasive Computing.

[15]  Stuart D. Cheshire,et al.  Discovering Named Instances of Abstract Services using DNS , 2001 .