Research Article
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
| SC1 | Replay Attack | SC16 | Blackhole Attack | SC2 | Changing Distance Attack | SC17 | Attribute-Trace Attack | SC3 | Same-Type-Device Attack | SC18 | Eavesdropping Attack | SC4 | Composition Attack | SC19 | Chosen-Plaintext Attack | SC5 | Redirection Attack | SC20 | Spam Attack | SC6 | Man-In-The-Middle Attack | SC21 | Identity Theft Attack | SC7 | Substitution Attack | SC22 | User Manipulation Attack | SC8 | DOS Attack | SC23 | Routing Attack | SC9 | Forging Attack | SC24 | Linkability Attack | SC10 | Colluding Attack | SC25 | Rejection Attack | SC11 | Flooding Attack | SC26 | Successive Response Attack | SC12 | False Message Attack | SC27 | Packet Analysis Attack | SC13 | Sybil Attack | SC28 | Packet Tracing Attack | SC14 | Message Modification | SC29 | Brute-Force Attack | SC15 | Wormhole Attack | ā | ā |
|
|