Abstract
Ubiquitous Computing environment mingles mobile computing and smart spaces, invisibility, localized scalability and uneven conditioning. In Ubiquitous network, service stations that are registered under respective service providers, invisibly available in real space to the user for providing user’s desired services. In ubiquitous network, service discovery by user for getting their desired service can be disrupted by identity spoofing attacker. Identity spoofing attacker can spoof the identity (IP address, ID) of a service station under a service provider and can falsify that service provider with its spoofed identity. At this point, ubiquitous network requires some level of trust to be established between service provider and service stations. In this paper, we have provided a Trusted Service Discovery against Identity Spoofing (TSD-IS) with its computational and architectural model in service discovery of ubiquitous network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moon, A., Kim, H., Kim, H., Lee, S.: Context-Aware Active Services in Ubiquitous Computing Environments. ETRI Journal 29(2) (2007)
Xiu, D., Liu, Z.: A Formal Definition for Trust in Distributed Systems. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 482–489. Springer, Heidelberg (2005)
Zhu, F., Mutka, M.W., Ni, L.M.: Service Discovery in Pervasive Computing Environment. IEEE Pervasive Computing, 81–90 (October-December 2005)
Kim, J., Baek, J., Kim, K., Zhou, J.: A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. In: Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. LNCS, vol. 6711, pp. 45–60. Springer, Heidelberg (2011)
Gonzalez, J.M., Anwar, M., Joshi, J.B.D.: A Trust-based Approach against IP-spoofing Attacks. In: Ninth Annual International Conference on Privacy, Security and Trust, pp. 978–971. IEEE (2011) print ISBN : 978-1-4577-0582-3, 978-1-4577-0584-7
Kagal, L., Korolev, V., Avancha, S., Joshi, A., Finin, T., Yesha, Y.: A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing. Techinal Report: TR-CS-01-06, Department of Computer Science and Electrical Engineering, University of Maryland Baltimore County (2001)
Trabelsi, S., Pazzaglia, J.-C., Roudier, Y.: Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing, pp. 35–43 (December 2006) print ISBN: 0-7695-2737-X
Soundar Rajam, V.K., Sundaresa Pandian, B., Mercy Shalinie, S., Pandey, T.: Application of IP Traceback Mechanism to OnlineVoting System. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds.) ADCONS 2011. LNCS, vol. 7135, pp. 621–630. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Hazra, S., Setua, S.K. (2015). Trusted Service Discovery against Identity Spoofing in Ubiquitous Computing Environment. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 327. Springer, Cham. https://doi.org/10.1007/978-3-319-11933-5_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-11933-5_46
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11932-8
Online ISBN: 978-3-319-11933-5
eBook Packages: EngineeringEngineering (R0)