TY - GEN
T1 - Best-effort authentication for opportunistic networks
AU - Solis, John
AU - Ginzboorg, Philip
AU - Asokan, N.
AU - Ott, Jörg
PY - 2011
Y1 - 2011
N2 - A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.
AB - A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.
UR - http://www.scopus.com/inward/record.url?scp=84855615266&partnerID=8YFLogxK
U2 - 10.1109/PCCC.2011.6108110
DO - 10.1109/PCCC.2011.6108110
M3 - Conference contribution
AN - SCOPUS:84855615266
SN - 9781467300100
T3 - Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
BT - 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011
T2 - 30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011
Y2 - 17 November 2011 through 19 November 2011
ER -