An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
IEEE Internet Computing
Photographic Authentication through Untrusted Terminals
IEEE Pervasive Computing
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Bluetooth Security
Service Discovery in Pervasive Computing Environments
IEEE Pervasive Computing
Quantitative evaluation of unlinkable ID matching schemes
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols
IEEE Transactions on Mobile Computing
Introduction to Probability Models, Ninth Edition
Introduction to Probability Models, Ninth Edition
Service discovery in wireless sensor networks: protocols & classifications
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Flexible and secure service discovery in ubiquitous computing
Journal of Network and Computer Applications
Secure and Private Service Discovery in Pervasive Computing Environments
International Journal of Advanced Pervasive and Ubiquitous Computing
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Location-aware private service discovery in pervasive computing environment
Information Sciences: an International Journal
Middleware for pervasive computing: A survey
Pervasive and Mobile Computing
An efficient service selection framework for pervasive environments
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
The involvement of only the necessary users and service providers for service discovery in pervasive computing environments is challenging. Without prudence, users’ and service providers’ requests or service information, their identities, and their presence information may be sacrificed. We identify that the problem may be as difficult as a chicken-and-egg problem, in which both users and service providers want the other parties to expose sensitive information first. In this paper, we propose a progressive and probabilistic approach to solve the problem. Users and service providers expose partial information in turn and avoid unnecessary exposure if there is any mismatch. Although one or two bits of information are exchanged in each message, we prove that the process converges and that the false positive overhead decreases quickly. Experiments and hypotheses tests show that security properties hold. We implemented the approach and the performance measurements show that the approach runs efficiently on PDAs.