Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Table 3

Notation of Sun et al.’s scheme [3].

NotationDescription

The secret key of the M2M server
Mobile user’s ID
M2M server’s ID
User’s password
The session key between a user and M2M server
Home gateway ID
Status flag of the mobile user
Cryptographic hash function
Hashing of the concatenation of and
Most significant bits of string
Using AES function to encrypt a with b as the key
Using AES function to decrypt a with b as the key