Chandranshu Gupta, Gaurav Varshney (IIT Jammu)

The Internet of Things (IoT) ecosystem is rapidly expanding, connecting resource-constrained devices that require lightweight and efficient security mechanisms. The Matter protocol standardizes secure communication in smart homes, relying on X.509 certificates for device authentication. While effective, the management of these certificates—including creation, storage, distribution, and revocation—is cumbersome and resourceintensive for IoT devices. Additionally, Matter’s reliance on private key storage increases vulnerability to key compromise. This paper proposes an improved lightweight authentication protocol combining Physical Unclonable Functions (PUFs) and Public Key Infrastructure (PKI) tailored for Matter-compliant IoT devices. By dynamically generating device-unique keys during operation, PUFs eliminate the need to store private keys, mitigating key extraction threats. The protocol reduces certificate storage overhead and simplifies the pairing process. Performance evaluations demonstrate significant reductions in computational overhead while maintaining robust security. By addressing Matter-specific challenges, the proposed approach optimizes device authentication, supports Perfect Forward Secrecy (PFS), and is well-suited for large-scale IoT deployments.

View More Papers

A Formal Approach to Multi-Layered Privileges for Enclaves

Ganxiang Yang (Shanghai Jiao Tong University), Chenyang Liu (Shanghai Jiao Tong University), Zhen Huang (Shanghai Jiao Tong University), Guoxing Chen (Shanghai Jiao Tong University), Hongfei Fu (Shanghai Jiao Tong University), Yuanyuan Zhang (Shanghai Jiao Tong University), Haojin Zhu (Shanghai Jiao Tong University)

Read More

Eclipse Attacks on Monero's Peer-to-Peer Network

Ruisheng Shi (Beijing University of Posts and Telecommunications), Zhiyuan Peng (Beijing University of Posts and Telecommunications), Lina Lan (Beijing University of Posts and Telecommunications), Yulian Ge (Beijing University of Posts and Telecommunications), Peng Liu (Penn State University), Qin Wang (CSIRO Data61), Juan Wang (Wuhan University)

Read More

Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to...

Qiyang Song (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Heqing Huang (Institute of Information Engineering, Chinese Academy of Sciences), Xiaoqi Jia (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Yuanbo Xie (Institute of Information…

Read More