Abstract
Ad hoc networks are formed opportunistically as mobile devices come within wireless communication range of each other. Since individual devices are typically subject to severe resource limitations, it is both possible and desirable for a device to enhance its functionality by taking advantage (in a cooperative manner) of capabilities available on other devices. Service provision refers to the process by which devices advertise their willingness to offer specific services and discover other services. This paper describes a service provision model designed specifically for use in ad hoc settings. Security policies governing service accessibility can be specified at the application level while secure communication among devices is ensured by the implementation.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Sun Microsystems: Jini technology core platform specification (2000)
Edwards, K.: Core JINI. Prentice-Hall, Englewood Cliffs (1999)
Microsoft Corporation: Universal plug and play forum, http://www.upnp.org
W3C: Simple object access protocol (soap), http://www.w3.org/TR/SOAP
Salutation Consortium: Salutation specifications, http://www.salutation.org
SIG, B.: Bluetooth specification, https://www.bluetooth.org/foundry/specification/document/specification
Murphy, A., Picco, G., Roman, G.C.: Lime: A middleware for physical and logical mobility. In: Proceedings of the 21st International Conference on Distributed Computing Systems, pp. 524–533 (2001)
Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems 7, 80–112 (1985)
Schmidt, D., Stal, M., Rohnert, H., Buschmann, F.: Pattern Oriented Software Architecture, vol. 2. John Wiley & Sons, Ltd., Chichester (1999)
Guttman, E.: Service location protocol: Automatic discovery of IP network services. IEEE Internet Computing 4, 71–80 (1999)
Goland, Y., Cai, T., Leach, P., Gu, Y.: Microsoft Corporation, Albright, S., Hewlett-Packard Company: Simple service discovery protocol/1.0: Operating without an arbiter (2001), http://www.upnp.org/download/draft_cai_ssdp_v1_03.txt
Jacob, B.: Service discovery: Access to local resources in a nomadic environment. In: OOPSLA 1996 Workshop on Object Replication and Mobile Computing (1996)
Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: ACM MobiHOC 2001 Symposium (2001)
Gong, L.: A secure identity-based capability system. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 56–63 (1989)
Lampson, B.: Protection. In: 5th Princeton Conf. on Information Sciences and Systems. ACM Operating Systems Rev., vol. 8, pp. 18–24 (1971)
Czerwinski, S.E., Zhao, B.Y., Hodes, T.D., Joseph, A.D., Katz, R.H.: An architecture for a secure service discovery service. In: Mobile Computing and Networking, pp. 24–35 (1999)
Burnside, M., Clarke, D., Mills, T., Devadas, S., Rivest, R.: Proxy-based security protocols in networked mobile devices. In: Proceedings of Selected Areas in Cryptography (2002)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Simple public key certificates (1999), Internet Draft http://world.std.com/cme/spki.txt
Rivest, R.L., Lampson, B.: Sdsi – a simple distributed security infrastructure. Presented at CRYPTO 1996 Rumpsession, http://citeseer.nj.nec.com/rivest96sdsi.html
Eronen, P., Lehtinen, J., Zitting, J., Nikander, P.: Extending jini with decentralized trust management. In: The Third IEEE Conference on Open Architectures and Network Programming, OPENARCH (2000)
Vettorello, M., Bettstetter, C., Schwingenschlgl, C.: Some notes on security in the service location protocol version 2 (slpv2). In: Proc. Workshop on Ad hoc Communications, in conjunction with 7th European Conference on Computer Supported Cooperative Work, ECSCW 2001 (2001)
Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public-key infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Press, I.C.S. (ed.) 17th Symposium on Security and Privacys, pp. 164–173 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Handorean, R., Roman, GC. (2003). Secure Service Provision in Ad Hoc Networks. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds) Service-Oriented Computing - ICSOC 2003. ICSOC 2003. Lecture Notes in Computer Science, vol 2910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24593-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-24593-3_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20681-1
Online ISBN: 978-3-540-24593-3
eBook Packages: Springer Book Archive