Secure Service Provision in Ad Hoc Networks

  • Radu Handorean
  • Gruia-Catalin Roman
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2910)


Ad hoc networks are formed opportunistically as mobile devices come within wireless communication range of each other. Since individual devices are typically subject to severe resource limitations, it is both possible and desirable for a device to enhance its functionality by taking advantage (in a cooperative manner) of capabilities available on other devices. Service provision refers to the process by which devices advertise their willingness to offer specific services and discover other services. This paper describes a service provision model designed specifically for use in ad hoc settings. Security policies governing service accessibility can be specified at the application level while secure communication among devices is ensured by the implementation.


Service Registry Payment Service Tuple Space Service Repository Service Advertisement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Sun Microsystems: Jini technology core platform specification (2000)Google Scholar
  2. 2.
    Edwards, K.: Core JINI. Prentice-Hall, Englewood Cliffs (1999)Google Scholar
  3. 3.
    Microsoft Corporation: Universal plug and play forum,
  4. 4.
    W3C: Simple object access protocol (soap),
  5. 5.
    Salutation Consortium: Salutation specifications,
  6. 6.
  7. 7.
    Murphy, A., Picco, G., Roman, G.C.: Lime: A middleware for physical and logical mobility. In: Proceedings of the 21st International Conference on Distributed Computing Systems, pp. 524–533 (2001)Google Scholar
  8. 8.
    Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems 7, 80–112 (1985)zbMATHCrossRefGoogle Scholar
  9. 9.
    Schmidt, D., Stal, M., Rohnert, H., Buschmann, F.: Pattern Oriented Software Architecture, vol. 2. John Wiley & Sons, Ltd., Chichester (1999)Google Scholar
  10. 10.
    Guttman, E.: Service location protocol: Automatic discovery of IP network services. IEEE Internet Computing 4, 71–80 (1999)CrossRefGoogle Scholar
  11. 11.
    Goland, Y., Cai, T., Leach, P., Gu, Y.: Microsoft Corporation, Albright, S., Hewlett-Packard Company: Simple service discovery protocol/1.0: Operating without an arbiter (2001),
  12. 12.
    Jacob, B.: Service discovery: Access to local resources in a nomadic environment. In: OOPSLA 1996 Workshop on Object Replication and Mobile Computing (1996)Google Scholar
  13. 13.
    Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: ACM MobiHOC 2001 Symposium (2001)Google Scholar
  14. 14.
    Gong, L.: A secure identity-based capability system. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 56–63 (1989)Google Scholar
  15. 15.
    Lampson, B.: Protection. In: 5th Princeton Conf. on Information Sciences and Systems. ACM Operating Systems Rev., vol. 8, pp. 18–24 (1971)Google Scholar
  16. 16.
    Czerwinski, S.E., Zhao, B.Y., Hodes, T.D., Joseph, A.D., Katz, R.H.: An architecture for a secure service discovery service. In: Mobile Computing and Networking, pp. 24–35 (1999)Google Scholar
  17. 17.
    Burnside, M., Clarke, D., Mills, T., Devadas, S., Rivest, R.: Proxy-based security protocols in networked mobile devices. In: Proceedings of Selected Areas in Cryptography (2002)Google Scholar
  18. 18.
    Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Simple public key certificates (1999), Internet Draft
  19. 19.
    Rivest, R.L., Lampson, B.: Sdsi – a simple distributed security infrastructure. Presented at CRYPTO 1996 Rumpsession,
  20. 20.
    Eronen, P., Lehtinen, J., Zitting, J., Nikander, P.: Extending jini with decentralized trust management. In: The Third IEEE Conference on Open Architectures and Network Programming, OPENARCH (2000)Google Scholar
  21. 21.
    Vettorello, M., Bettstetter, C., Schwingenschlgl, C.: Some notes on security in the service location protocol version 2 (slpv2). In: Proc. Workshop on Ad hoc Communications, in conjunction with 7th European Conference on Computer Supported Cooperative Work, ECSCW 2001 (2001)Google Scholar
  22. 22.
    Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public-key infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  23. 23.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Press, I.C.S. (ed.) 17th Symposium on Security and Privacys, pp. 164–173 (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Radu Handorean
    • 1
  • Gruia-Catalin Roman
    • 1
  1. 1.Department of Computer Science and EngineeringWashington University in St. LouisSt. LouisUSA

Personalised recommendations