service information should not be divulged to exter-
nal service entities that are not directly participating
in the service discovery process. Secondly, the iden-
tities of service entities should not be disclosed un-
necessarily without the owner’s permission. Thirdly,
the physical location information of the service enti-
ties should not be revealed. Finally, colluding SP or
SD nodes should not be able to correlate a particular
SU node’s actions. Like the confidentiality service,
this service mitigates the effects of the information
disclosure threat.
6 CONCLUSION
In this paper, we have presented a threat model in the
context of which potential service discovery threats
were identified and analysed according to the differ-
ent types of node misbehaviour. We proceeded to de-
rive the security services that are required to mitigate
the identified threats. This work will provide a basis
for the design of secure service discovery schemes.
We believe that the two most important security re-
quirements that need to be addressed are mutual au-
thentication followed by authorisation. Existing solu-
tions for mutual authentication are not well suited for
an environment such as an ad hoc network, as there
is no central authority. Supporting mutual authenti-
cation between two interacting service entities is very
challenging in such circumstances. The need to au-
thenticate a specific identity may not be necessary if
one entity is able to prove to the other that it is a trust-
worthy service provider or user.
Similarly, achieving authorisation in this sort of dy-
namic and peer to peer environment is particularly
challenging for several reasons. Firstly, a central ad-
ministrator does not exist to pre-specify a security
policy. Secondly, service entities may belong to dif-
ferent administrative domains. Finally, authorisation
can only take place after two service entities are mutu-
ally authenticated, which is still an unsolved problem.
Fortunately, research on these authorisation problems
has been conducted under the auspices of Trust Nego-
tiation.
The dynamism of ad hoc networks has introduce
many new and interesting security problems that call
for new solutions.
REFERENCES
Gao, Z., Wang, L., Yang, M., and Yang, X. (2006).
CNPGSDP: An efficient group-based service discov-
ery protocol for MANETs. Computer Networks. (In
Press).
Garcia-Macias, J. A. and Torres, D. A. (2005). Service dis-
covery in mobile ad hoc networks: Better at the net-
work layer? In Proc of 34th International Conference
on Parallel Processing (ICPP 2005), pages 452–457.
IEEE ComSoc.
Gollmann, D. (2005). Computer Security. John Wiley &
Sons, West Sussex, England, 2nd edition.
Guichal, G. and Toh, C. K. (2001). An evaluation of central-
ized and distributed service location protocols for per-
vasive wireless networks. In Proc of 12th IEEE Inter-
national Symposium on Personal, Indoor and Mobile
Radio Communications (PIMRC 2001), pages 55–61.
Lim, B.-I., Choi, K.-H., and Shin, D.-R. (2005). An ar-
chitecture for lightweight service discovery protocol
in Manet. In Proc of 5th International Computa-
tional Science Conference (ICCS 2005), pages 963–
966. Springer-Verlag LNCS 3526, Berlin.
Mishra, A. and Nadkarni, K. M. (2003). Security in Wire-
less Ad Hoc Networks. In Ilyas, M., editor, The Hand-
book of Ad Hoc Wireless Networks, chapter 30, pages
30.1–30.51. CRC Press, Boca Raton, FL, USA.
Mohan, U., Almeroth, K. C., and Belding-Royer, E. M.
(2004). Scalable service discovery in mobile ad hoc
networks. In Proc of 3rd IFIP Networking Confer-
ence, pages 137–149. Springer-Verlag LNCS 3042,
Berlin.
O’Sullivan, J., Edmond, D., and Hofstede, A. (2002).
What’s in a service? Towards accurate description
of non-functional service properties. Distributed and
Parallel Databases Journal, 12(2/3):117–133.
Papadimitratos, P. and Hass, Z. J. (2003). Securing mobile
ad hoc networks. In Ilyas, M., editor, The Handbook
of Ad Hoc Wireless Networks, chapter 31, pages 31.1–
31.17. CRC Press, Boca Raton, FL, USA.
Rao, R. (2004). Integration of on-demand service and route
discovery in mobile ad hoc networks. Master’s the-
sis, Dept of Computer Science, North Carolina State
University.
Swiderski, F. and Snyder, W. (2004). Threat Modeling. Mi-
crosoft Press, Redmond, Washington.
Toh, C. (2002). Ad Hoc Mobile Wireless Networks: Proto-
cols and Systems. Prentice Hall, Upper Saddle River,
NJ, USA.
Tseng, Y.-C., Ni, S.-Y., Chen, Y.-S., and Sheu, J.-P. (2002).
The broadcast storm problem in a Mobile Ad Hoc Net-
work. Wireless Networks, 8(2-3):153–167.
Tyan, J. and Mahmoud, Q. H. (2005). A comprehensive ser-
vice discovery solution for Mobile Ad Hoc Networks.
Mobile Networks and Applications, 10(4):423–434.
Yau, P. W. and Mitchell, C. J. (2003). Security vulnerabili-
ties in ad hoc networks. In Proc of the 7th Int Sympo-
sium on Comms Theory and Applications (ISCTA’03),
pages 99–104. HW Communications Ltd.
Zhou, D. (2003). Security issues in ad hoc networks. In
Ilyas, M., editor, The Handbook of Ad Hoc Wireless
Networks, chapter 32, pages 32.1–32.14. CRC Press,
Boca Raton, FL, USA.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
174