{"title":"泛在网络中基于信任的安全无线通信","authors":"S. Hazra, S. Setua","doi":"10.1109/HNICEM.2014.7016194","DOIUrl":null,"url":null,"abstract":"Ubiquitous computing environment is a coalesced consequence of wireless and mobile computing, smart spaces along with invisibility, localized scalability and uneven conditioning. In Ubiquitous network, wireless communication between consumers and service stations are imperceptibly done in real space through a number of directory servers for getting user requested services. When consumers need a Web service, they query directory servers. A Directory server discovers available service station for consumer using Web service discovery process. Malevolent service stations may attack directory servers during service discovery and disrupt the wireless communication in service delivery process. As a corollary, ubiquitous environment necessitates a definite level of trust to be built in wireless communication between service stations and directory servers for desired service discovery. In this paper, we have proposed Trusted Service Discovery against Malevolent Service Station (TSD-MSS) protocol with a trust based security approach. Proposed TSD-MSS depends on context aware architectural and computational model to prevent malicious behaviour in service discovery for consumers in ubiquitous wireless network. The outcome of proposed approach in simulated environment corroborates the claim of our research.","PeriodicalId":309548,"journal":{"name":"2014 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trust based secure wireless communication in Ubiquitous network\",\"authors\":\"S. Hazra, S. Setua\",\"doi\":\"10.1109/HNICEM.2014.7016194\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ubiquitous computing environment is a coalesced consequence of wireless and mobile computing, smart spaces along with invisibility, localized scalability and uneven conditioning. In Ubiquitous network, wireless communication between consumers and service stations are imperceptibly done in real space through a number of directory servers for getting user requested services. When consumers need a Web service, they query directory servers. A Directory server discovers available service station for consumer using Web service discovery process. Malevolent service stations may attack directory servers during service discovery and disrupt the wireless communication in service delivery process. As a corollary, ubiquitous environment necessitates a definite level of trust to be built in wireless communication between service stations and directory servers for desired service discovery. In this paper, we have proposed Trusted Service Discovery against Malevolent Service Station (TSD-MSS) protocol with a trust based security approach. Proposed TSD-MSS depends on context aware architectural and computational model to prevent malicious behaviour in service discovery for consumers in ubiquitous wireless network. The outcome of proposed approach in simulated environment corroborates the claim of our research.\",\"PeriodicalId\":309548,\"journal\":{\"name\":\"2014 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HNICEM.2014.7016194\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HNICEM.2014.7016194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trust based secure wireless communication in Ubiquitous network
Ubiquitous computing environment is a coalesced consequence of wireless and mobile computing, smart spaces along with invisibility, localized scalability and uneven conditioning. In Ubiquitous network, wireless communication between consumers and service stations are imperceptibly done in real space through a number of directory servers for getting user requested services. When consumers need a Web service, they query directory servers. A Directory server discovers available service station for consumer using Web service discovery process. Malevolent service stations may attack directory servers during service discovery and disrupt the wireless communication in service delivery process. As a corollary, ubiquitous environment necessitates a definite level of trust to be built in wireless communication between service stations and directory servers for desired service discovery. In this paper, we have proposed Trusted Service Discovery against Malevolent Service Station (TSD-MSS) protocol with a trust based security approach. Proposed TSD-MSS depends on context aware architectural and computational model to prevent malicious behaviour in service discovery for consumers in ubiquitous wireless network. The outcome of proposed approach in simulated environment corroborates the claim of our research.