DocumentCode :
2722062
Title :
Best-effort authentication for opportunistic networks
Author :
Solis, John ; Ginzboorg, Philip ; Asokan, N. ; Ott, Jörg
Author_Institution :
Sandia Nat. Labs., Livermore, CA, USA
fYear :
2011
fDate :
17-19 Nov. 2011
Firstpage :
1
Lastpage :
6
Abstract :
A “best-effort” authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.
Keywords :
authorisation; authentication strength; best-effort authentication method; network resources; networking scenarios; opportunistic networks; resource hogs; Ad hoc networks; Authentication; Buffer storage; Digital signatures; Load modeling; Resource management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Performance Computing and Communications Conference (IPCCC), 2011 IEEE 30th International
Conference_Location :
Orlando, FL
ISSN :
1097-2641
Print_ISBN :
978-1-4673-0010-0
Type :
conf
DOI :
10.1109/PCCC.2011.6108110
Filename :
6108110
Link To Document :
بازگشت