Abstract
The pervasive computing paradigm assumes an essentially dynamic model of interaction between devices that also motivates the need to discover the services offered by previously unknown parties at an early phase of these interactions. Whereas this assumption is at the heart of many pervasive computing protocols and systems, the necessity of securing service discovery and the complexity of this task have been largely underestimated, if considered at all. This paper discusses the implications of insecure service discovery in available systems and which security objectives should be pursued. The design space for introducing security features into a specific architecture, namely registry-based discovery systems, is then explored and assessed.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhu, F., Mutka, M., Ni, L.: Classification of Service Discovery in Pervasive Computing Environments. MSU-CSE-02-24, Michigan State university, East Lansing (2002)
Bussard, L., Roudier, Y.: Embedding Distance Bounding Protocols within Intuitive Interactions. In: 1st International Conference on Security in Pervasive Computing, SPC 2003, Boppard, Germany, March 12-13 (2003)
OASIS, WS-Discovery, http://msdn.microsoft.com/ws/2004/10/ws-discovery/
Kagal, L.: Rei: A Policy Language for the Me-Centric Project. HP Technical Report (2002)
OASIS, WS-Policy Specifications, http://msdn.microsoft.com/webservices/default.aspx?pull=/library/en-s/dnglobspec/html/ws-policy1202.asp
Martin, D., et al.: Bringing Semantics to Web Services: The OWL-S Approach. In: Cardoso, J., Sheth, A.P. (eds.) SWSWPC 2004. LNCS, vol. 3387, pp. 26–42. Springer, Heidelberg (2005)
Czerwinski, S., et al.: An architecture for a Secure Service Discovery Service. In: Proceedings of Mobicom 1999, Seattle, USA (1999)
Almenarez, F., Campo, C.: SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks. In: 9th Open European Summer School and IFIP Workshop on Next Generation Networks, Budapest (2003)
Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (Percom 2003), pp. 235–242. IEEE Computer Society, Los Alamitos (2003)
MOSQUITO Project IST 004636, https://www.mosquito-online.org/
Ghader, M., et al.: Secure resource and service discovery in personal networks. Wireless World Research Forum Meeting #12, Canada, November 4-5 (2004)
Zhu, F., Mutka, M., Ni, L.: Prudent exposure: A private and user centric service discovery protocol. In: Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), Orlando, USA (2004)
SUN Microsystems, Jini Specifications, http://java.sun.com/products/jini/
OASIS, UDDI, http://www.uddi.org
Garofalakis, O., et al.: Web Service Discovery Mechanisms: Looking for a Needle in a Haystack?”. In: 15th ACM Conference on Hypertext and Hypermedia (Hypertext 2004), Santa Cruz, USA (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Trabelsi, S., Pazzaglia, JC., Roudier, Y. (2006). Enabling Secure Discovery in a Pervasive Environment. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734666_3
Download citation
DOI: https://doi.org/10.1007/11734666_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33376-0
Online ISBN: 978-3-540-33377-7
eBook Packages: Computer ScienceComputer Science (R0)