Best-effort authentication for opportunistic networks

John Solis, Philip Ginzboorg, N. Asokan, Jörg Ott

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.

Original languageEnglish
Title of host publication30th IEEE International Performance Computing and Communications Conference, IPCCC 2011
DOIs
StatePublished - 2011
Externally publishedYes
Event30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011 - Orlando, FL, United States
Duration: 17 Nov 201119 Nov 2011

Publication series

NameConference Proceedings of the IEEE International Performance, Computing, and Communications Conference

Conference

Conference30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011
Country/TerritoryUnited States
CityOrlando, FL
Period17/11/1119/11/11

Fingerprint

Dive into the research topics of 'Best-effort authentication for opportunistic networks'. Together they form a unique fingerprint.

Cite this