Font Size: a A A

A Secure Service Discovery Model In Pervasive Computing

Posted on:2013-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:F ShenFull Text:PDF
GTID:2248330395456252Subject:Information security
Abstract/Summary:PDF Full Text Request
Pervasive computing makes it possible to integrate the physical world we are living in and the virtual world in the information space together as the whole, where the users can expediently and transparently obtain digital services. Therefore, it is necessary to provide a mechanism that users can find and select devices or service. The devices should be able to autonomously communicate with each other and the process must be transparently completed to users. Many service discovery protocols for traditional networks have been proposed, some of which have been widely used. To solve the challenges posed by pervasive computing, a service discovery model is needed that can resolve security and effectively issues for pervasive computing. In the paper we present a trust-based dynamic secure service discovery model.In order to solve resource management problems in the pervasive computing, we use SOA architecture in our service discovery scheme. A great attention has been paid to several typical service discovery protocols, such as UPnP、Salutation、Bluebooth、 SLP、Jini. As a whole, it is found that the service discovery protocol which we have known don’t fit for the pervasive computing, because those protocols are lack of perfect security mechanism and are not suit for the dynamic environment.In this paper, we design a security service discovery scheme. In which we classify the services that can be provided by devices in pervasive environment into three levels, different level of services being discovered in different manners. In this paper we also incorporate a trust manage model to calculate the trust value of a service requestor. We use a dynamic service discovery model to realize the trade-off between discovery efficacy and privacy.At last, a simulation is made in the GolMoSim network simulator. We compare the efficiency of our approach with the traditional service discovery protocol. In the end a summary and prospects of this paper is given.
Keywords/Search Tags:pervasive computing, secure service discovery, group membershiptest, trust management unit
PDF Full Text Request
Related items