Scalable service discovery in ubiquitous and pervasive computing architectures: A percolation-driven approach

2013 ◽  
Vol 29 (3) ◽  
pp. 693-703 ◽  
Author(s):  
Francesco Palmieri

Author(s):  
M. Bakhouya ◽  
J. Gaber

The recent evolution of network connectivity from wired connection to wireless to mobile access together with their crossing has engendered their widespread use with new network-computing challenges. More precisely, network infrastructures are not only continuously growing, but their usage is also changing and they are now considered to be the foundation of other new technologies. A related research area concerns ubiquitous and pervasive computing systems and their applications. The design and development of ubiquitous and pervasive applications require new operational models that will permit an efficient use of resources and services, and a reduction of the need for the administration effort typical in client-server networks (Gaber, 2000, 2006). More precisely, in ubiquitous and pervasive computing, to be able to develop and implement applications, new ways and techniques for resource and service discovery and composition need to be developed.



Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.



2009 ◽  
Vol 1 (1) ◽  
pp. 53-63 ◽  
Author(s):  
Felix J. Villanueva ◽  
Francisco Moya ◽  
Fernando Rincon Santofimia ◽  
David Villa ◽  
Jesus Barba ◽  
...  


2008 ◽  
Vol 31 (18) ◽  
pp. 4281-4293 ◽  
Author(s):  
Sheikh I. Ahamed ◽  
Moushumi Sharmin


2004 ◽  
Vol 9 (6) ◽  
pp. 679-692 ◽  
Author(s):  
Olga Ratsimor ◽  
Dipanjan Chakraborty ◽  
Anupam Joshi ◽  
Timothy Finin ◽  
Yelena Yesha


Sign in / Sign up

Export Citation Format

Share Document