Research Article
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
Table 2
Summary of attacks in M2M networks and defense protocols [
1].
| Adversary model | [8] | [2] | [9] | [4] | [6] | [3] | [5] | [10] | [11] | Ours |
| Audio Replay attack | | ✓ | | ✓ | ✓ | ✓ | | | 1 | | Changing distance attack | | | | | | | | | | | Same-type-device attack | | | | | | | | | | | Composition attack | | | | | | | | | | | Redirection attack | ✓ | | ✓ | | | | ✓ | | | | Man-in-the-middle attack | ✓ | | ✓ | | ✓ | ✓ | | | | | Substitution attack | ✓ | ✓ | ✓ | ✓ | ✓ | | | | | | DoS attack | | | | | | | | | | | Replay attack | ✓ | | | | ✓ | | | | | | Forging attack | | | | ✓ | | | | | | | Colluding attack | ✓ | | | ✓ | | | ✓ | | | | Flooding attack | ✓ | | | | | | ✓ | | ✓ | | Side-channel attack | ✓ | | | | | | ✓ | | ✓ | | False messages attack | ✓ | | | | ✓ | ✓ | ✓ | | ✓ | | Sybil attack | | | | | ✓ | ✓ | | | ✓ | | Movement tracking | | | | | ✓ | | | | ✓ | | Message modification | | | | | ✓ | | | | | | Impersonation attack | | | | | ✓ | | | | | | Guessing attack | | | | | | | | | | | Stolen-verifier attack | | | | | | | | | | | Wormhole attack | ✓ | ✓ | | ✓ | | ✓ | | | ✓ | | Blackhole attack | ✓ | ✓ | | ✓ | ✓ | ✓ | | | ✓ | | Attribute-trace attack | | | | | ✓ | | | | | | Eavesdropping attack | | | | | ✓ | ✓ | | | ✓ | | Chosen-plaintext attack | | | | | ✓ | | | | ✓ | | Spam attack | ✓ | | | | ✓ | ✓ | | | ✓ | | Identity theft attack | ✓ | | | | | ✓ | | | | | User manipulation attack | ✓ | | | | | ✓ | ✓ | | ✓ | | Routing attack | ✓ | | | | | ✓ | | | | | Linkability attack | ✓ | | | | | | | | | | Rejection attack | | | | | | | | | | | Successive-response attack | | | | | | | | | | | Packet analysis attack | | ✓ | | | | ✓ | | | ✓ | | Packet tracing attack | | ✓ | | | | ✓ | | | ✓ | | Brute-force attack | ✓ | ✓ | | ✓ | ✓ | | ✓ | ✓ | | |
|
|
Fully supported = , partially supported = ✓, and empty = not supported. |