TY - GEN
T1 - SLAP: Secure lightweight authentication protocol for resource-constrained devices
AU - Aliberti, Giulio
AU - Di Pietro, Roberto
AU - Guarino, Stefano
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2017/1/1
Y1 - 2017/1/1
N2 - Motivated by the upcoming Internet of Things, designing light-weight authentication protocols for resource constrained devices is among the main research directions of the last decade. Current solutions in the literature attempt either to improve the computational efficiency of cryptographic authentication schemes, or to build a provably-secure scheme relying on the hardness of a specific mathematical problem. In line with the principles of information-theoretic security, in this paper we present a novel challenge-response protocol, named SLAP, whose authentication tokens only leak limited information about the secret key, while being very efficient to be generated. We do support our proposal with formal combinatorial arguments, further sustained by numeric evaluations, that clarify the impact of system parameters on the security of the protocol, yielding evidence that SLAP allows performing a reasonable number of secure authentication rounds with the same secret key.
AB - Motivated by the upcoming Internet of Things, designing light-weight authentication protocols for resource constrained devices is among the main research directions of the last decade. Current solutions in the literature attempt either to improve the computational efficiency of cryptographic authentication schemes, or to build a provably-secure scheme relying on the hardness of a specific mathematical problem. In line with the principles of information-theoretic security, in this paper we present a novel challenge-response protocol, named SLAP, whose authentication tokens only leak limited information about the secret key, while being very efficient to be generated. We do support our proposal with formal combinatorial arguments, further sustained by numeric evaluations, that clarify the impact of system parameters on the security of the protocol, yielding evidence that SLAP allows performing a reasonable number of secure authentication rounds with the same secret key.
UR - http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0006431101630174
UR - http://www.scopus.com/inward/record.url?scp=85029420477&partnerID=8YFLogxK
U2 - 10.5220/0006431101630174
DO - 10.5220/0006431101630174
M3 - Conference contribution
SN - 9789897582592
SP - 163
EP - 174
BT - ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
PB - SciTePress
ER -