Chandranshu Gupta, Gaurav Varshney (IIT Jammu)

The Internet of Things (IoT) ecosystem is rapidly expanding, connecting resource-constrained devices that require lightweight and efficient security mechanisms. The Matter protocol standardizes secure communication in smart homes, relying on X.509 certificates for device authentication. While effective, the management of these certificates—including creation, storage, distribution, and revocation—is cumbersome and resourceintensive for IoT devices. Additionally, Matter’s reliance on private key storage increases vulnerability to key compromise. This paper proposes an improved lightweight authentication protocol combining Physical Unclonable Functions (PUFs) and Public Key Infrastructure (PKI) tailored for Matter-compliant IoT devices. By dynamically generating device-unique keys during operation, PUFs eliminate the need to store private keys, mitigating key extraction threats. The protocol reduces certificate storage overhead and simplifies the pairing process. Performance evaluations demonstrate significant reductions in computational overhead while maintaining robust security. By addressing Matter-specific challenges, the proposed approach optimizes device authentication, supports Perfect Forward Secrecy (PFS), and is well-suited for large-scale IoT deployments.

View More Papers

TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based...

Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of Texas at Dallas)

Read More

A Systematic Evaluation of Novel and Existing Cache Side...

Fabian Rauscher (Graz University of Technology), Carina Fiedler (Graz University of Technology), Andreas Kogler (Graz University of Technology), Daniel Gruss (Graz University of Technology)

Read More

The Philosopher’s Stone: Trojaning Plugins of Large Language Models

Tian Dong (Shanghai Jiao Tong University), Minhui Xue (CSIRO's Data61), Guoxing Chen (Shanghai Jiao Tong University), Rayne Holland (CSIRO's Data61), Yan Meng (Shanghai Jiao Tong University), Shaofeng Li (Southeast University), Zhen Liu (Shanghai Jiao Tong University), Haojin Zhu (Shanghai Jiao Tong University)

Read More

Hidden and Lost Control: on Security Design Risks in...

Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Emma Delph…

Read More