Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Figure 5

User state processing.