Service Discovery in Pervasive Computing Environments
IEEE Pervasive Computing
Middleware 2007 Works in Progress
IEEE Distributed Systems Online
EVEY: enhancing privacy of service discovery in pervasive computing
Proceedings of the 2007 ACM/IFIP/USENIX international conference on Middleware companion
A trustworthy framework for impromptu service discovery with mobile devices
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Ninja: non identity based, privacy preserving authentication for ubiquitous environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
Middleware for pervasive computing: A survey
Pervasive and Mobile Computing
Hi-index | 0.00 |
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes pervasive, the number of service providers also increase dramatically. Because of security and privacy concerns, network services are segmented by service providers. Existing service discovery protocols, however, do not address how to facilitate users to properly identify and authenticate with existing service providers. Without prudence, sensitive information may be exposed. Conversely, with prudence both users and service providers prefer the other party to expose sensitive information first. We identify that even among legitimate users and service providers, there are privacy concerns that may be expressed as a chicken-and-egg problem. In this paper, we propose a progressive approach to solve the problem. Users and service providers expose minimal sensitive information in turn and identify necessary exposure during the process. Theoretical analysis, simulation, and experiments show that our approach protects sensitive information with little overhead.