Journal of Computer Networks and Communications / 2013 / Article / Tab 2 / Research Article
Untangling RFID Privacy Models Table 2 Comparison of the presented privacy models. “
✓ ” (resp., “
✗ ”) means that the feature is (resp., is not) given to the adversary
. “N/A” means that the feature is not applicable in the model.
Feature Model Avoine JW Vaudenay LBM DMR CCEG DLYZ HPVP Interaction with all the tags Only 2 tags not
✓ ✓ not corrupted agents ✓ not all clean tags all-but-one Choice of the challenge tags ✗ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Attack on incomplete executions Both ✓ ✓ ✗ ✓ ✓ ✓ ✓ CO RRUPT challenge tags Only
Only
✓ ✓ ✗ ✓ ✗ ✓ CORRUPT nonchallenge tags N/A ✓ N/A N/A ✓ N/A ✓ N/A CORRUPT any tag ✗ ✗ ✓ ✓ ✗ ✓ ✗ ✓
/
both
Both Channels asymmetry ✓ ✗ ✗ ✗ ✗ ✗ ✗ ✗ Protocols analyzable 3-pass with independent secrets SK based all all all all
-pass All Tag-init protocols analyzable ✗ ✓ ✗ ✗ ✓ ✗ ✗ ✗