Abstract

Ubiquitous Computing environment mingles mobile computing and smart spaces, invisibility, localized scalability and uneven conditioning. In Ubiquitous network, service stations that are registered under respective service providers, invisibly available in real space to the user for providing user’s desired services. In ubiquitous network, service discovery by user for getting their desired service can be disrupted by identity spoofing attacker. Identity spoofing attacker can spoof the identity (IP address, ID) of a service station under a service provider and can falsify that service provider with its spoofed identity. At this point, ubiquitous network requires some level of trust to be established between service provider and service stations. In this paper, we have provided a Trusted Service Discovery against Identity Spoofing (TSD-IS) with its computational and architectural model in service discovery of ubiquitous network.KeywordsService discoveryidentity spoofing attackdirect trustindirect trusttrustortrustee

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call