Abstract
Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects (without own processing power, e.g. RFID tags). This paper introduces a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by associating public keys to passive objects, which can be used by peers to validate proxies (peers additionally acting on behalf of objects). To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.
Original language | English |
---|---|
Title of host publication | Proceedings of 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003) |
Pages | 105-121 |
Number of pages | 17 |
Volume | 85 |
Edition | 3 |
DOIs | |
Publication status | Published - Aug 2003 |
Event | 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003) - Eindhoven, Netherlands Duration: 30 Jun 2003 → 4 Jul 2003 http://www.cs.unibo.it/secco03/ |
Publication series
Name | Electronic Notes in Theoretical Computer Science |
---|---|
Publisher | Elsevier |
ISSN (Print) | 1571-0661 |
Conference
Conference | 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003) |
---|---|
Country/Territory | Netherlands |
City | Eindhoven |
Period | 30.06.2003 → 04.07.2003 |
Internet address |