Abstract-Prior work has shown that uncontrolled messaging in ad-hoc opportunistic networks results in a disproportionate sharing of network capacity. Solutions based on publicly verifiable sender authentication mechanisms, such as those in [1], require complete message transmission for proper verification. However, introducing message fragmentation, e.g., to optimize limited transmission opportunities, could negatively impact resource management. Unverifiable message fragments that are assigned lower priorities are discarded sooner and reduce delivery ratios. This paper investigates the extent of this impact and shows that publicly verifiable fragment authentication mechanisms are needed to retain the benefits of fragmentation as well as resource management.We take this a step further and show through simulations that strong authenticity guarantees for intermediaries are unnecessary in our specific scenario. Best-effort authentication schemes, where the probability of false positives is much higher than in typical authentication schemes, are sufficient. This suggests the existence of other scenarios where this approach is also applicable. We describe various best-effort authentication techniques and analyze their computation and space savings.