Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

  • Rene Mayrhofer
  • , Florian Ortner
  • , Alois Ferscha
  • , Manfred Hechinger

Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag

14 Zitate (Scopus)

Abstract

Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects (without own processing power, e.g. RFID tags). This paper introduces a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by associating public keys to passive objects, which can be used by peers to validate proxies (peers additionally acting on behalf of objects). To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.

OriginalspracheEnglisch
TitelProceedings of 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003)
Seiten105-121
Seitenumfang17
Band85
Auflage3
DOIs
PublikationsstatusVeröffentlicht - Aug. 2003
Veranstaltung1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003) - Eindhoven, Niederlande
Dauer: 30 Juni 20034 Juli 2003
http://www.cs.unibo.it/secco03/

Publikationsreihe

NameElectronic Notes in Theoretical Computer Science
Herausgeber (Verlag)Elsevier
ISSN (Print)1571-0661

Konferenz

Konferenz1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003)
Land/GebietNiederlande
OrtEindhoven
Zeitraum30.06.200304.07.2003
Internetadresse

Fingerprint

Untersuchen Sie die Forschungsthemen von „Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren