Research Article
A RFID Authentication Protocol for Epidemic Prevention and Epidemic Emergency Management Systems
Table 4
Security requirements comparisons.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SR1: mutual authentication. SR2: tag untraceability. SR3: tag anonymity. SR4: backward/forward secrecy. SR5: scalability. SR6: collision attacks. SR7: DoS attacks. SR8: replay attacks. SR9: location tracking attack. SR10: stolen-verifier attacks. SR11: database impersonation attacks. SR12: reader impersonation attacks.√: yes provides; ×: does not provide. |