Our scheme follows general standard algorithms such as ECDH, Trimmed H-MAC, and AES.
We used a hybrid cryptographic scheme (ECDH, AES, SHA-1, and H-MAC) to share confidentiality and integrity keys for required entities securely.
Moreover, each device is uniquely identified with an ID, and this ID protects the device from sniffing with H-MAC diversification on the public network.
The proposed scheme uses a temporary ID and hides the identity with H-MAC. Real IDs are never transmitted over public networks.
In our scheme, we have secure communication for all stages and we used standard AES and trimmed H-MAC algorithms immune to brute-force attacks.