Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Figure 8

Operation resource comparison between Sun et al. [3] and the proposed scheme.