An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments

A secure resource discovery model for devices running in pervasive computing environments has become significant. Due to the constrained nature of these devices, the need for a model that allows discovery and sharing of resources without putting much overhead on the operation of devices is needed. The dependency on fixed powerful machines for ensuring security is not desired and also not feasible. In this paper, we present a resource discovery model that provides security whenever needed without degrading the performance of the device. We also propose a trust based service-oriented adaptive security mechanism named SSRD (simple and secure resource discovery)

[1]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[2]  Mahadev Satyanarayanan,et al.  Fundamental challenges in mobile computing , 1996, PODC '96.

[3]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[4]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[5]  Lionel M. Ni,et al.  PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[6]  Celeste Campo,et al.  SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .

[7]  T. Nixon,et al.  Home networking with Universal Plug and Play , 2001 .

[8]  Frank Stajano,et al.  The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.

[9]  Philip Zimmermann,et al.  PGP source code and internals , 1995 .

[10]  Sheikh Iqbal Ahamed,et al.  ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications , 2007, Int. J. Netw. Secur..

[11]  Sheikh Iqbal Ahamed,et al.  PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business , 2005, COMPSAC.

[12]  Djamshid Tavangarian,et al.  Security architecture for service-based mobile environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[13]  Lionel M. Ni,et al.  Expose or not? A progressive exposure approach for service discovery in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[14]  Sheikh Iqbal Ahamed,et al.  MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[15]  Jianping Hu,et al.  A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[16]  Armando Fox,et al.  System Software for Ubiquitous Computing , 2022 .

[17]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[18]  Sheikh Iqbal Ahamed,et al.  Knowledge Usability and its Characteristics for Pervasive Computing , 2005, PSC.

[19]  Mark Weiser,et al.  Some Computer Science Problems in Ubiquitous Computing , 1993 .

[20]  Jin Nakazawa,et al.  Improving security for ubiquitous campus applications , 2004, 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops..

[21]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[22]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[23]  Sheikh Iqbal Ahamed,et al.  SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[24]  David R. Karger,et al.  INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.

[25]  Anand R. Tripathi,et al.  Context-based secure resource access in pervasive computing environments , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.