A trust-based secure service discovery (TSSD) model for pervasive computing

被引:17
|
作者
Ahamed, Sheikh I. [1 ]
Sharmin, Moushumi [2 ]
机构
[1] Marquette Univ, Milwaukee, WI 53233 USA
[2] Univ Illinois, Urbana, IL 61801 USA
关键词
MARKS; Secure service discovery; Pervasive computing;
D O I
10.1016/j.comcom.2008.07.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this paper, we present a trust-based secure Service discovery model, TSSD (trust-based secure service discovery) for a truly pervasive environment. Our model is a hybrid one that allows both secure and non-secure discovery of services. This model allows Service discovery and sharing based oil mutual trust. The security model handles the communication and service sharing security issues. TSSD also incorporates a trust mode for sharing Services with unknown devices. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:4281 / 4293
页数:13
相关论文
共 50 条
  • [1] Trust-based service evaluation and selection model in pervasive computing environment
    School of Computer Science and Technology, Shandong University, Ji'nan 250100, China
    [J]. Ruan Jian Xue Bao, 2006, SUPPL. (200-210):
  • [2] A trust-based service evaluation and selection model in pervasive computing environment
    Chen, Zhenxiang
    Ge, Liansheng
    Wang, Haiyang
    Huang, Xianzhi
    Lin, Jinjiao
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 641 - +
  • [3] Trust-based dynamic authorization model for pervasive computing
    Guo, Yajun
    Wang, Liang
    Hong, Fan
    Han, Lansheng
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 70 - 73
  • [4] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [5] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    [J]. COMPUTER, 2001, 34 (12) : 154 - 157
  • [6] A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing
    Ahamed, Sheikh I.
    Sharmin, Moushumi
    Ahmed, Shameem
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 590 - +
  • [7] A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
    Jeffrey Undercoffer
    Filip Perich
    Andrej Cedilnik
    Lalana Kagal
    Anupam Joshi
    [J]. Mobile Networks and Applications, 2003, 8 : 113 - 125
  • [8] A secure infrastructure for service discovery and access in pervasive computing
    Undercoffer, J
    Perich, F
    Cedilnik, A
    Kagal, L
    Joshi, A
    [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02): : 113 - 125
  • [9] Secure and Private Service Discovery in Pervasive Computing Environments
    Zhu, Feng
    Zhu, Wei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 107 - 122
  • [10] A Secure Framework to Support Service Discovery in Pervasive Computing
    Sharifi, Mandi
    Manaf, Azizah Abdul
    Tabatabaei, Sayed Gholam Hassan
    Movahednejad, Homa
    [J]. CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 1368 - 1373