Title :
Best-effort authentication for opportunistic networks
Author :
Solis, John ; Ginzboorg, Philip ; Asokan, N. ; Ott, Jörg
Author_Institution :
Sandia Nat. Labs., Livermore, CA, USA
Abstract :
A “best-effort” authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the case of fragment authentication by intermediaries in an opportunistic network. We describe mechanisms for implementing best-effort authentication, with the caveat that an authentication strength sufficient in one scenario may be unfit for another.
Keywords :
authorisation; authentication strength; best-effort authentication method; network resources; networking scenarios; opportunistic networks; resource hogs; Ad hoc networks; Authentication; Buffer storage; Digital signatures; Load modeling; Resource management;
Conference_Titel :
Performance Computing and Communications Conference (IPCCC), 2011 IEEE 30th International
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4673-0010-0
DOI :
10.1109/PCCC.2011.6108110