170 likes | 311 Views
The Security for Service Discovery Protocols in Pervasive Computing. Su Jin Kim Su.Kim@asu.edu. Outline. Overview Existing Protocols Security Issues PrudentExposure: Serive Discovery Protocol Conclusion. Pervasive Computing. Pervasive Computing Environments
E N D
The Security for Service Discovery Protocols in Pervasive Computing Su Jin Kim Su.Kim@asu.edu
Outline • Overview • Existing Protocols • Security Issues • PrudentExposure: Serive Discovery Protocol • Conclusion
Pervasive Computing • Pervasive Computing Environments • Consist of networked computing devices in our surroundings ex) tiny sensors, embedded devices…
Service Discovery Protocols • Service Discovery Protocols • Enable a user to discover, configure, and communicate with services • Are designed to minimize administrative overhead and increase usability • What types of services are available? • Where are the services? • How can clients contact the services?
Security Access the personal information Access and use the devices
Attackers • Passive attackers • An attacker eavesdrops on communications between devices. He is only interested in catching the secret information. • Active attackers • An attackers act as a legitimate user and ceases the functionality of the network.
Security Requirements • Authentication • Confirm the identity of users • Authorization • Verify whether a user is allowed to do actions • Confidentiality • Is related to which users are allowed to read the messages being transferred • Integrity • Verify whether the message is modified by others • Privacy • Hide the information, identities and presence information
Challenges • Characteristics of Pervasive Computing • Heterogeneity • Hardware, Software, Infrastructure, and Security Requirement • Mobility • Dynamic changes in environments • Limited resources • Hardware and Energy
Service Discovery Infrastructure • Components • User Agents • Perform service discovery on behalf of client software • Service Agents • Advertise the location and attributes on behalf of services • Directory Agents • Aggregate and manage service information • Directory-based infrastructure • Large Networks • Nondirectory-based infrastructure • Small Networks
Service Request:Printer Service Reply Nondirectory-based Service Discovery User Agent Service Agent
Service Request:Printer Service Ack Service Reply Service Register Directory-based Service Discovery User Agent Directory Agent Service Agent
PrudentExposure • Example Scenario • Alice and Bob work at the same office and they have various devices. They don’t want to expose any information of their own service and user account. • Provide privacy for services and users • At the service’s side, service information, identity, and presence information should be hidden from others • At the user’s side, user’s identity, information, and presence information should be hidden to others • Directory-based service discovery
Fake bites 1 1 Bloom Filter • Domain Identity • Share between a directory and users in the domain • Bloom filters • Checks the membership Hash (Domain_ID | R) 0 1 2 3 4 5 6 7 …
matched Reply Membership test User Agent Request + R Directory Agent
Problems & Conclusion (1) • The absence of a directory • Need to support both directory and nondirectory-based systems • SLP has overhead to determine the infrastructure. • Revocation • To deregister a user, we need to update the new domain identity to each user in the domain.
Problems & Conclusion (2) • Heterogeneity • Devices have different capabilities and security requirements. • We need to support different security policies based on categories. • Goals: • Provide the privacy • Provide the both infrastructures: directory & Nondirectory-based service discovery protocols • Minimize the overhead