IEEE International Performance Computing and Communications Conference (2011)
Orlando, FL, USA
Nov. 17, 2011 to Nov. 19, 2011
John Solis , Sandia National Labs Livermore CA, USA
Philip Ginzboorg , Nokia Research Center, Helsinki, Finland
N. Asokan , Nokia Research Center, Helsinki, Finland
Jorg Ott , Aalto University, School of Science and Technology, Espoo, Finland
A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.
N. Asokan, J. Solis, J. Ott and P. Ginzboorg, "Best-effort authentication for opportunistic networks," IEEE International Performance Computing and Communications Conference(PCCC), Orlando, FL, USA, 2011, pp. 1-6.