Secure and Private Service Discovery in Pervasive Computing Environments

Secure and Private Service Discovery in Pervasive Computing Environments

Feng Zhu, Wei Zhu
Copyright: © 2010 |Volume: 2 |Issue: 3 |Pages: 14
ISSN: 1937-965X|EISSN: 1937-9668|EISBN13: 9781609609870|DOI: 10.4018/japuc.2010070104
Cite Article Cite Article

MLA

Zhu, Feng, and Wei Zhu. "Secure and Private Service Discovery in Pervasive Computing Environments." IJAPUC vol.2, no.3 2010: pp.46-59. http://doi.org/10.4018/japuc.2010070104

APA

Zhu, F. & Zhu, W. (2010). Secure and Private Service Discovery in Pervasive Computing Environments. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 2(3), 46-59. http://doi.org/10.4018/japuc.2010070104

Chicago

Zhu, Feng, and Wei Zhu. "Secure and Private Service Discovery in Pervasive Computing Environments," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 2, no.3: 46-59. http://doi.org/10.4018/japuc.2010070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.