Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

Rene Mayrhofer, Florian Ortner, Alois Ferscha, Manfred Hechinger

Research output: Chapter in Book/Report/Conference proceedingsConference contribution

12 Citations (Scopus)

Abstract

Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects (without own processing power, e.g. RFID tags). This paper introduces a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by associating public keys to passive objects, which can be used by peers to validate proxies (peers additionally acting on behalf of objects). To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.

Original languageEnglish
Title of host publicationProceedings of 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003)
Pages105-121
Number of pages17
Volume85
Edition3
DOIs
Publication statusPublished - Aug 2003
Event1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003) - Eindhoven, Netherlands
Duration: 30 Jun 20034 Jul 2003
http://www.cs.unibo.it/secco03/

Publication series

NameElectronic Notes in Theoretical Computer Science
PublisherElsevier
ISSN (Print)1571-0661

Conference

Conference1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (Secco 2003)
CountryNetherlands
CityEindhoven
Period30.06.200304.07.2003
Internet address

Fingerprint Dive into the research topics of 'Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks'. Together they form a unique fingerprint.

Cite this