Research Article
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
Table 11
Operation comparison between Sun et al.’s [
3] and the proposed scheme.
| Scheme Operations | User | M2M Server | Home Gateway | Total | Proposed | [3] | Proposed | [3] | Proposed | [3] | Proposed | [3] |
| M2M Server Setup | 0 | 0 | | 0 | 0 | 0 | | 0 |
| Home Gateway Setup | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| User Setup | | 0 | 0 | 0 | 0 | 0 | | 0 |
| User Registration and Key Pairing | | 0 | | | 0 | 0 | | |
| User Login And Authentication | | | | | 0 | 0 | | |
| User Home Gateway Key Injection | 0 | N/A | 0 | N/A | 0 | N/A | 0 | N/A |
| Home Gateway Join Network | 0 | 0 | | | | | | |
| User Password Change | | 0 | | | 0 | 0 | | |
| User Logout | | N/A | | N/A | 0 | N/A | | N/A |
| Home Gateway Re-Join Network | 0 | N/A | | N/A | | N/A | | N/A |
|
|