{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:10:22Z","timestamp":1654121422306},"reference-count":20,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7,1]]},"abstract":"<p>With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a \u201cchicken-andegg problem\u201d: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users\u2019 and service providers\u2019 privacy.<\/p>","DOI":"10.4018\/japuc.2010070104","type":"journal-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T13:08:23Z","timestamp":1333631303000},"page":"46-59","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Private Service Discovery in Pervasive Computing Environments"],"prefix":"10.4018","volume":"2","author":[{"given":"Feng","family":"Zhu","sequence":"first","affiliation":[{"name":"University of Alabama in Huntsville, USA"}]},{"given":"Wei","family":"Zhu","sequence":"additional","affiliation":[{"name":"Intergraph Co., USA"}]}],"member":"2432","reference":[{"key":"japuc.2010070104-0","doi-asserted-by":"crossref","unstructured":"Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., & Lilley, J. (1999). The design and implementation of an intentional naming system. 17th ACM Symposium on Operating Systems Principles (SOSP \u201999), Kiawah Island, SC.","DOI":"10.1145\/319151.319164"},{"key":"japuc.2010070104-1","unstructured":"Apple Computer Inc. (2003). Rendezvous Web Site. Retrieved from http:\/\/developer.apple.com\/macosx\/rendezvous\/"},{"key":"japuc.2010070104-2","doi-asserted-by":"crossref","unstructured":"Balazinska, M., Balakrishnan, H., & Karger, D. (2002). INS\/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery. Pervasive 2002 - International Conference on Pervasive Computing, Zurich, Switzerland, Springer-Verlag.","DOI":"10.1007\/3-540-45866-2_16"},{"key":"japuc.2010070104-3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canettiy, R., & Krawczykz, H. (1996). Keying Hash Functions for Message Authentication. Advances in Cryptology\u2013CRYPTO \u201996 (LNCS 1109).","DOI":"10.1007\/3-540-68697-5_1"},{"key":"japuc.2010070104-4","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"japuc.2010070104-5","unstructured":"Bluetooth, S. I. G. (2004). Specification of the Bluetooth System. Retrieved from http:\/\/www.bluetooth.org\/"},{"key":"japuc.2010070104-6","unstructured":"Cheshire, S. (2002). Discovering Named Instances of Abstract Services using DNS, Apple Computer. Retrieved from http:\/\/files.dns-sd.org\/draft-cheshire-dnsext-dns-sd.txt"},{"key":"japuc.2010070104-7","doi-asserted-by":"crossref","unstructured":"Czerwinski, S., Zhao, B. Y., Hodes, T., Joseph, A., & Katz, R. (1999). An Architecture for a Secure Service Discovery Service. Fifth Annual International Conference on Mobile Computing and Networks (MobiCom '99), Seattle, WA.","DOI":"10.1145\/313451.313462"},{"key":"japuc.2010070104-8","doi-asserted-by":"crossref","unstructured":"Guttman, E., Perkins, C., Veizades, J., & Day, M. (1999). Service Location Protocol, Version 2. Retrieved from http:\/\/www.ietf.org\/rfc\/rfc2608.txt","DOI":"10.17487\/rfc2608"},{"key":"japuc.2010070104-9","unstructured":"Miller, B. (1999). Mapping Salutation Architecture APIs to Bluetooth Service Discovery Layer, Bluetooth SIG. Retrieved from http:\/\/www.salutation.org\/whitepaper\/btoothmapping.pdf"},{"key":"japuc.2010070104-10","doi-asserted-by":"publisher","DOI":"10.1109\/35.968819"},{"key":"japuc.2010070104-11","doi-asserted-by":"crossref","unstructured":"Nidd, M. (2001). Service Discovery in DEAPspace. IEEE Personal Communications(August): 39-45.","DOI":"10.1109\/98.944002"},{"key":"japuc.2010070104-12","author":"A.Ross","year":"2008","journal-title":"Security Engineering: A Guide to Building Dependable Distributed Systems"},{"key":"japuc.2010070104-13","unstructured":"Salutation Consortium. (1999). Salutation Architecture Specification. Retrieved from ftp:\/\/ftp.salutation.org\/salute\/sa20e1a21.ps"},{"key":"japuc.2010070104-14","doi-asserted-by":"crossref","unstructured":"Stajano, F., & Anderson, R. (1999). The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. 7th International Workshop on Security protocols, Cambridge, UK.","DOI":"10.1007\/10720107_24"},{"key":"japuc.2010070104-15","unstructured":"Sun Microsystems. (2003). Jini Technology Core Platform Specification, from http:\/\/wwws.sun.com\/software\/jini\/specs\/"},{"key":"japuc.2010070104-16","unstructured":"Zhu, F., Mutka, M., & Ni, L. (2003). Splendor: A Secure, Private, and Location-aware Service Discovery Protocol Supporting Mobile Services. 1st IEEE Annual Conference on Pervasive Computing and Communications, Fort Worth, Texas, IEEE Computer Society Press."},{"key":"japuc.2010070104-17","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.87"},{"key":"japuc.2010070104-18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.1599409"},{"key":"japuc.2010070104-19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1075"}],"container-title":["International Journal of Advanced Pervasive and Ubiquitous Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=51666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:40:26Z","timestamp":1654119626000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/japuc.2010070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,7,1]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,7]]}},"URL":"https:\/\/doi.org\/10.4018\/japuc.2010070104","relation":{},"ISSN":["1937-965X","1937-9668"],"issn-type":[{"value":"1937-965X","type":"print"},{"value":"1937-9668","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7,1]]}}}