Research Article
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
Table 1
Summary of cryptosystems and countermeasures in M2M communication [
1].
| Cryptosystems and Countermeasures | [8] | [2] | [9] | [4] | [6] | [3] | [5] | [10] | [11] | Ours |
| Secure cryptographic hash function [12] | | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | ✓ | Original data acquisition | | | | | | | | ✓ | | | Spatial-Domain transformation | | | | | | | | ✓ | | | Time-domain transformation | | | | | | | | ✓ | | | C-MA (Correlation coefficient-based matching algorithm) | ✓ | | | | | | | | | | D-MA (Deviation ratio-based matching algorithm) | ✓ | | | | | | | | | | AMACs (Aggregate message authentication codes) [13] | | ✓ | | | | | | | ✓ | | Certificateless aggregate signature [14] | | | ✓ | | | | | | | | ECDH (Elliptic Curve Diffie-Hellman) [15] | | | | ✓ | | | | | | ✓ | ID-based signature scheme [13] | | | | | ✓ | | | | | | AES (Advanced encryption standard) [16] | | | | | | ✓ | | | | ✓ | Hybrid Linear Combination Encryption [17] | | | | | | | ✓ | | | |
|
|
Supported = ✓; empty = not supported.
|