Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

TitleSecuring Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks
Publication TypeConference Paper
Year of Publication2003
AuthorsMayrhofer, R., Ortner F., Ferscha A., & Hechinger M.
EditorFocardi, R.., & Zavattaro G..
Conference NameElectronic Notes in Theoretical Computer Science
Date PublishedJune
PublisherElsevier Science

Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects without own processing power. We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by equipping passive objects with public keys, which can be used by peers to validate proxies acting on behalf of the objects. To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.