scholarly journals A trust-based secure service discovery (TSSD) model for pervasive computing

2008 ◽  
Vol 31 (18) ◽  
pp. 4281-4293 ◽  
Author(s):  
Sheikh I. Ahamed ◽  
Moushumi Sharmin
Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


2004 ◽  
Vol 9 (6) ◽  
pp. 679-692 ◽  
Author(s):  
Olga Ratsimor ◽  
Dipanjan Chakraborty ◽  
Anupam Joshi ◽  
Timothy Finin ◽  
Yelena Yesha

Author(s):  
Karima Belgharbi ◽  
Mahmoud Boufaida

The environments of pervasive computing are open and dynamic. In order to ensure the dynamic discovery of services evolving in a heterogeneous and dynamic environment, specific extensions to WSDL, known as A-WSDL are suggested. These extensions permit to a service provider to define the context of service use and the behavior associated to each change of context. To verify and prove the expected behavior of the suggested discovery protocol in the design phase, the Event-B formalism is adopted. One of the advantages of the Event B formalism is the application of the refining techniques which permit to express complex features by means of mathematical proofs and moves from an abstract specification to a concrete specification by using the Rodin tool which offers a support for the refining and the proofs.


2005 ◽  
Vol 4 (4) ◽  
pp. 81-90 ◽  
Author(s):  
Fen Zhu ◽  
M.W. Mutka ◽  
L.M. Ni

Author(s):  
Mohammed Fethi Khalfi ◽  
Sidi Mohamed Benslimane

Pervasive environments are characterized by a large number of embedded devices offering their services to the user. Which of the available services are of most interest to the user considerably depends on the user's current context. Spontaneous service discovery and selection is one of the most important fields of research in pervasive computing. In this paper the authors will present an enhancement of ubiquitous computing discovery mechanisms adding context handling capabilities to Web Services for Devices in Pervasive Computing using UPnP as an infrastructure to address these implicit requests. User preferences, network and location are described by a formal context model ontology that is based on two levels: a generic level and a domain specific level. As compared with previous research, the authors' method uses location aware, UPnP infrastructure, web service for devices and the notion of proactivity in pervasive computing to continuously present the Spontaneous most relevant services to the user or device in response to changes of context, services or user preferences.


Sign in / Sign up

Export Citation Format

Share Document