Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Table 8

Analyzed attacks.

SC1Replay AttackSC16Blackhole Attack
SC2Changing Distance AttackSC17Attribute-Trace Attack
SC3Same-Type-Device AttackSC18Eavesdropping Attack
SC4Composition AttackSC19Chosen-Plaintext Attack
SC5Redirection AttackSC20Spam Attack
SC6Man-In-The-Middle AttackSC21Identity Theft Attack
SC7Substitution AttackSC22User Manipulation Attack
SC8DOS AttackSC23Routing Attack
SC9Forging AttackSC24Linkability Attack
SC10Colluding AttackSC25Rejection Attack
SC11Flooding AttackSC26Successive Response Attack
SC12False Message AttackSC27Packet Analysis Attack
SC13Sybil AttackSC28Packet Tracing Attack
SC14Message ModificationSC29Brute-Force Attack
SC15Wormhole Attack