Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks


Security and privacy in mobile ad-hoc peer-to-peer environments arehard to attain, especially when working with passive objects withoutown processing power. We introduce a method for integrating suchobjects into a peer-to-peer environment without infrastructure componentswhile providing a high level of privacy and security for peers interactingwith objects. The integration is done by equipping passive objectswith public keys, which can be used by peers to validate proxiesacting on behalf of the objects. To overcome the problem of limitedstorage capacity on small embedded objects, ECC keys are used.

Electronic Notes in Theoretical Computer Science