skip to main content
10.1145/1378063.1378106acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilityConference Proceedingsconference-collections
research-article

A trustworthy framework for impromptu service discovery with mobile devices

Published: 10 September 2007 Publication History

Abstract

Wireless hotspots are permeating our workplace, home and public places bringing interesting services and spontaneous connectivity to mobile users. While it's ideal to enable the mobile clients to discover services automatically with the device-to-hand across the augmented physical spaces, it's equally important to guarantee the security and privacy of the mobile clients and service providers. In this paper, we propose a trustworthy framework that can support impromptu service discovery with mobile devices in WLAN enabled environments. Different from the existing service discovery approaches, the framework requires no specialized hardware or software installation in mobile client devices, it can preserve the privacy of mobile users during the authentication process by not requesting their identities. We prototyped a set of assistive services in a shopping mall which can be spontaneously discovered and accessed by a disabled person from his WLAN enabled mobile device, we show how both the security and privacy are achieved in a unified manner using trusted computing platforms.

References

[1]
Edwards, W. K., Newman, M. W., Sedivy, J. Z., Smith T. F. and Izadi S., Challenge: Recombinant Computing and the Speakeasy Approach, Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MobiCom 2002). Atlanta, GA. September 23--28, 2002.
[2]
Lee, C. etc., Universal Interactions with Smart Spaces. IEEE Pervasive Computing, Vol. 5, Jan. 2006, pp. 16--21
[3]
Nakajima T. and Satoh I., A software infrastructure for supporting spontaneous and personalized interaction in home computing environments. Personal and Ubiquitous Computing, pp 379--391, 2006.
[4]
Rukzio E., etc., An Experimental Comparison of Physical Mobile Interaction Techniques: Touching, Pointing and Scanning, Proceedings of the Ubicomp 2006, California, USA. 17--21 September 2006.
[5]
Hodes T. D. and Katz R. H., Composable ad-hoc location-based services for heterogeneous mobile clients. Wireless Networks, Vol. 5, No. 5, pp 441--427, 1999.
[6]
Kindberg, T. etc., People, Places, Things: Web Presence for the Real World, HPLabs Report, HPL-2001-279.
[7]
Universal Plug and Play (UPnP) Forum, UPnP Device Architecture, Version 1.0. December 2003. http://www.upnp.org
[8]
http://www.jini.org
[9]
Czerwinski, S., Zhao, B. Y., Hodes, T., Joseph, A., Randy, K., An architecture for secure service discovery service, Proceedings of MobiCom '99, 1999.
[10]
Ellison, C., Home network security, Intel technology journal, Vol. 6, PP 37--48, 2002.
[11]
Zhu, F., Mutka, M. W., Ni, L. M., A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols. IEEE Trans. Mob. Comput. 5(4): 418--429 (2006)
[12]
Zhu, F., Zhu W., Mutka, M. W., Ni, L. M., Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. PerCom 2005: 225--234
[13]
Creese, S., Goldsmith, M., Roscoe, B. and Zakiuddin, I., Authentication for Pervasive Computing, International Conference on Security in Pervasive Computing, 2003
[14]
Open Service Gateway Initiative (OSGi), http://www.osgi.org
[15]
Wang, X., Zhang, D., Dong, J., Chin C. and Hettiarachchi, S. R., Semantic Space: A Semantic Web Infrastructure for Smart Spaces. IEEE Pervasive Computing, Vol. 3, No. 2, 2004
[16]
http://www.trustedcomputinggroup.org
[17]
Camenisch, J. and Lysyanskaya, A., A Signature Scheme with Efficient Protocols, Proceedings of the Third Conference on Security in Communication Networks, volume 2576 of LNCS, pages 268--289, Springer Verlag, 2002.
[18]
Brickell, E., Camenisch, J. and Chen, L., Direct Anonymous Attestation, Proceeding of ACM CCS 2004.
[19]
Yu, Z. etc., Supporting Context-Aware Media Recommendations for Smart Phones, IEEE Pervasive Computing, Vol. 5, No. 3, July-September 2006, pp. 68--75.

Cited By

View all
  • (2010)Privacy-Enhanced Trusted Location Based Services (PE-TLBS) framework based on Direct Anonymous Attestation (DAA) protocol2010 International Conference on Computer Applications and Industrial Electronics10.1109/ICCAIE.2010.5735093(297-303)Online publication date: Dec-2010

Index Terms

  1. A trustworthy framework for impromptu service discovery with mobile devices

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
    September 2007
    702 pages
    ISBN:9781595938190
    DOI:10.1145/1378063
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 September 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. privacy
    2. service discovery
    3. spontaneous interaction
    4. trusted computing
    5. ubiquitous computing

    Qualifiers

    • Research-article

    Conference

    MC07
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2010)Privacy-Enhanced Trusted Location Based Services (PE-TLBS) framework based on Direct Anonymous Attestation (DAA) protocol2010 International Conference on Computer Applications and Industrial Electronics10.1109/ICCAIE.2010.5735093(297-303)Online publication date: Dec-2010

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media