Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Table 5

Notation of the proposed scheme.

NotationDescription

The secret key of the M2M server
Mobile user’s ID
Temporal Mobile User’s ID
M2M server’s ID
User’s password
The session key between User and M2M server
Home Gateway ID
Temporal Home Gateway ID
User State
Home Gateway State
concatenation of and
Most significant bits of string
Cryptographic SHA256 hash function
Cryptographic SHA1 hash function
Using AES function to encrypt a with b as the key
Using AES function to decrypt a with b as the key
Keyed Cryptographic Mac and Hash Function
User ECDH Key Pairing Identifier
ECDH Secret Key
ECDH User Public Key
ECDH User Private Key
ECDH M2M Server Public Key
ECDH M2M Server Private Key
ECDH Key Pair Generation for Entity
M2M Server ECDH Secret Key Derivation
ECDH Encryption with input
ECDH Decryption with input
Encryption Key
MAC (Message Authentication Code) Key