|Title||Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks|
|Publication Type||Conference Paper|
|Year of Publication||2003|
|Authors||Mayrhofer, R., Ortner F., Ferscha A., & Hechinger M.|
|Editor||Focardi, R., & Zavattaro G.|
|Conference Name||Electronic Notes in Theoretical Computer Science|
Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects without own processing power. We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by equipping passive objects with public keys, which can be used by peers to validate proxies acting on behalf of the objects. To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used.