2015 | OriginalPaper | Buchkapitel
Trusted Service Discovery against Identity Spoofing in Ubiquitous Computing Environment
verfasst von : Swarnali Hazra, S. K. Setua
Erschienen in: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Ubiquitous Computing environment mingles mobile computing and smart spaces, invisibility, localized scalability and uneven conditioning. In Ubiquitous network, service stations that are registered under respective service providers, invisibly available in real space to the user for providing user’s desired services. In ubiquitous network, service discovery by user for getting their desired service can be disrupted by identity spoofing attacker. Identity spoofing attacker can spoof the identity (IP address, ID) of a service station under a service provider and can falsify that service provider with its spoofed identity. At this point, ubiquitous network requires some level of trust to be established between service provider and service stations. In this paper, we have provided a Trusted Service Discovery against Identity Spoofing (TSD-IS) with its computational and architectural model in service discovery of ubiquitous network.