Research Article
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
Table 5
Notation of the proposed scheme.
| Notation | Description |
| | The secret key of the M2M server | | Mobile user’s ID | | Temporal Mobile User’s ID | | M2M server’s ID | | User’s password | | The session key between User and M2M server | | Home Gateway ID | | Temporal Home Gateway ID | | User State | | Home Gateway State | | concatenation of and | | Most significant bits of string | | Cryptographic SHA256 hash function | | Cryptographic SHA1 hash function | | Using AES function to encrypt a with b as the key | | Using AES function to decrypt a with b as the key | | Keyed Cryptographic Mac and Hash Function | | User ECDH Key Pairing Identifier | | ECDH Secret Key | | ECDH User Public Key | | ECDH User Private Key | | ECDH M2M Server Public Key | | ECDH M2M Server Private Key | | ECDH Key Pair Generation for Entity | | M2M Server ECDH Secret Key Derivation | | ECDH Encryption with input | | ECDH Decryption with input | | Encryption Key | | MAC (Message Authentication Code) Key |
|
|