The Community for Technology Leaders
IEEE International Performance Computing and Communications Conference (2011)
Orlando, FL, USA
Nov. 17, 2011 to Nov. 19, 2011
ISBN: 978-1-4673-0010-0
pp: 1-6
John Solis , Sandia National Labs Livermore CA, USA
Philip Ginzboorg , Nokia Research Center, Helsinki, Finland
N. Asokan , Nokia Research Center, Helsinki, Finland
Jorg Ott , Aalto University, School of Science and Technology, Espoo, Finland
ABSTRACT
A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.
INDEX TERMS
CITATION

N. Asokan, J. Solis, J. Ott and P. Ginzboorg, "Best-effort authentication for opportunistic networks," IEEE International Performance Computing and Communications Conference(PCCC), Orlando, FL, USA, 2011, pp. 1-6.
doi:10.1109/PCCC.2011.6108110
151 ms
(Ver 3.3 (11022016))