Publikation

Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

Outline:

R. Mayrhofer, F. Ortner, A. Ferscha, M. Hechinger - Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks - Proceedings of 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003), Eindhoven, Niederlande, 2003

Abstract:

Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects without own processing power. We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by equipping passive objects with public keys, which can be used by peers to validate proxies acting on behalf of the objects. To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.