Publications
Best-effort authentication for opportunistic networks
Solis, John; Ginzboorg, Philip; Asokan, N.; Ott, Jörg
A "best-effort" authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another. © 2011 IEEE.