Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Table 1

Summary of cryptosystems and countermeasures in M2M communication [1].

Cryptosystems and Countermeasures[8][2][9][4][6][3][5][10][11]Ours

Secure cryptographic hash function [12]
Original data acquisition
Spatial-Domain transformation
Time-domain transformation
C-MA (Correlation coefficient-based matching algorithm)
D-MA (Deviation ratio-based matching algorithm)
AMACs (Aggregate message authentication codes) [13]
Certificateless aggregate signature [14]
ECDH (Elliptic Curve Diffie-Hellman) [15]
ID-based signature scheme [13]
AES (Advanced encryption standard) [16]
Hybrid Linear Combination Encryption [17]

Supported = ✓; empty = not supported.