Abstract
I’ll start with a summary of the resurrecting duckling security policy model for those who haven’t seen it. It regulates interactions between wireless gadgets: the scenario is one where you have plenty of items that all have a microprocessor in them, like everything has nowadays. The claim is that what is going to happen next is that they will all have a transceiver in them so that they will be able to talk to each other and they will be able to be peripherals of each other and exchange messages. You won’t have situations like your camera having to have a microphone inside to do the voice annotation, because you can use something else that already has a microphone — like your telephone for example, or your tape recorder - and just use the microphone in that to send sound to the things that need the voice annotation, and so on. So everything can use everything else as a peripheral.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stajano, F. (2001). The Resurrecting Duckling — What Next?. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_28
Download citation
DOI: https://doi.org/10.1007/3-540-44810-1_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42566-3
Online ISBN: 978-3-540-44810-5
eBook Packages: Springer Book Archive