Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Table 2

Summary of attacks in M2M networks and defense protocols [1].

Adversary model[8][2][9][4][6][3][5][10][11]Ours

Audio Replay attack1
Changing distance attack
Same-type-device attack
Composition attack
Redirection attack
Man-in-the-middle attack
Substitution attack
DoS attack
Replay attack
Forging attack
Colluding attack
Flooding attack
Side-channel attack
False messages attack
Sybil attack
Movement tracking
Message modification
Impersonation attack
Guessing attack
Stolen-verifier attack
Wormhole attack
Blackhole attack
Attribute-trace attack
Eavesdropping attack
Chosen-plaintext attack
Spam attack
Identity theft attack
User manipulation attack
Routing attack
Linkability attack
Rejection attack
Successive-response attack
Packet analysis attack
Packet tracing attack
Brute-force attack

Fully supported = , partially supported = ✓, and empty = not supported.