Abstract: As smart home devices become more widely available, their limited resources and potential exposure to various types of cyber-attacks make it difficult for the traditional security protocols ...