Research Article
Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection
Table 2
Protocol performance analysis.
| Performance actor | Hash-Lock | Radom Hash-Lock | Hash-Chain | The proposed protocol |
| Computational complexity | | | | | Tag | | | | | Reader | — | | — | | DataBase | — | — | | | Security performance | | | | | Resistance to counterfeiting attacks | × | × | × | ✓ | Resistance to tracking attacks | × | × | ✓ | ✓ | Resistance to replay attacks | × | × | × | ✓ | Two-way authentication | × | × | ✓ | ✓ |
|
|