Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Coruh U., Bayat O.

SECURITY AND COMMUNICATION NETWORKS, vol.2018, 2018 (SCI-Expanded) identifier identifier

  • Publication Type: Article / Article
  • Volume: 2018
  • Publication Date: 2018
  • Doi Number: 10.1155/2018/6563089
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus
  • Recep Tayyip Erdoğan University Affiliated: Yes


In this paper, we analyzed Sun et al.'s scheme which proposes an M2M (Machine-to-Machine) secure communication scheme by using existing TD SCMA (Time Division-Synchronous Code Division Multiple Access) networks. They offer a password-based authentication and key establishment protocol for mutual authentication. Moreover, their proposed secure channel establishment protocol uses symmetric cryptography and one-way hash algorithms and they considered using their protected channel model for mobile users and smart home networks. In this paper, we propose to complete the missing part of Sun et al.'s scheme. This can occur by addressing privacy-preserving and message modification protection. Moreover, improvements can be made to M l'I'M (Man-In-The-Middle) attack resistance, anomaly detection and DoS (Denial-of-Service) attacks with timing. ECDH (Elliptic Curve Diffie Hellman) cryptography based protected cipher-key exchange operation used on initial setup and key-injection operations to provide secure user registration, user password change and home gateway network join phases. We simulated both the proposed and Sun et al.'s schemes. We analyzed Sun et al.'s scheme for performance, network congestion and resource usage. Missing privacy-preserving was analyzed and compared with the GLARM scheme, and the storage cost of each phase was analyzed according to Ferrag et al.'s survey proposal. In Sun et al.'s scheme, future work for the security architecture of the home network is related to Li et al.'s protocol being implemented in our proposed design.