The Community for Technology Leaders
IEEE International Performance Computing and Communications Conference (2011)
Orlando, FL, USA
Nov. 17, 2011 to Nov. 19, 2011
ISBN: 978-1-4673-0010-0
pp: 1-6
N. Asokan , Nokia Research Center, Helsinki, Finland
John Solis , Sandia National Labs Livermore CA, USA
Jorg Ott , Aalto University, School of Science and Technology, Espoo, Finland
Philip Ginzboorg , Nokia Research Center, Helsinki, Finland
ABSTRACT
A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.
INDEX TERMS
CITATION
N. Asokan, John Solis, Jorg Ott, Philip Ginzboorg, "Best-effort authentication for opportunistic networks", IEEE International Performance Computing and Communications Conference, vol. 00, no. , pp. 1-6, 2011, doi:10.1109/PCCC.2011.6108110
161 ms
(Ver 3.3 (11022016))