An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Challenge: recombinant computing and the speakeasy approach
Proceedings of the 8th annual international conference on Mobile computing and networking
Semantic Space: An Infrastructure for Smart Spaces
IEEE Pervasive Computing
Proceedings of the 11th ACM conference on Computer and communications security
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Universal Interactions with Smart Spaces
IEEE Pervasive Computing
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols
IEEE Transactions on Mobile Computing
Supporting Context-Aware Media Recommendations for Smart Phones
IEEE Pervasive Computing
Personal and Ubiquitous Computing
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Hi-index | 0.01 |
Wireless hotspots are permeating our workplace, home and public places bringing interesting services and spontaneous connectivity to mobile users. While it's ideal to enable the mobile clients to discover services automatically with the device-to-hand across the augmented physical spaces, it's equally important to guarantee the security and privacy of the mobile clients and service providers. In this paper, we propose a trustworthy framework that can support impromptu service discovery with mobile devices in WLAN enabled environments. Different from the existing service discovery approaches, the framework requires no specialized hardware or software installation in mobile client devices, it can preserve the privacy of mobile users during the authentication process by not requesting their identities. We prototyped a set of assistive services in a shopping mall which can be spontaneously discovered and accessed by a disabled person from his WLAN enabled mobile device, we show how both the security and privacy are achieved in a unified manner using trusted computing platforms.