Research Article
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
Table 3
Notation of Sun et al.’s scheme [
3].
| Notation | Description |
| | The secret key of the M2M server | | Mobile user’s ID | | M2M server’s ID | | User’s password | | The session key between a user and M2M server | | Home gateway ID | | Status flag of the mobile user | | Cryptographic hash function | | Hashing of the concatenation of and | | Most significant bits of string | | Using AES function to encrypt a with b as the key | | Using AES function to decrypt a with b as the key |
|
|