Publications

Publications / Conference

Best-effort authentication for opportunistic networks

Solis, John; Ginzboorg, Philip; Asokan, N.; Ott, Jörg

A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another. © 2011 IEEE.