Research Article

A RFID Authentication Protocol for Epidemic Prevention and Epidemic Emergency Management Systems

Table 4

Security requirements comparisons.

Requirements[27][23][28][29][30][10][15][1]Ours

SR1××××
SR2×××----
SR3×××----
SR4××----
SR5×××----
SR6×××××
SR7×××××
SR8××××
SR9----------------
SR10----------------
SR11--------------×
SR12--------------×

SR1: mutual authentication. SR2: tag untraceability. SR3: tag anonymity. SR4: backward/forward secrecy. SR5: scalability. SR6: collision attacks. SR7: DoS attacks. SR8: replay attacks. SR9: location tracking attack. SR10: stolen-verifier attacks. SR11: database impersonation attacks. SR12: reader impersonation attacks.√: yes provides; ×: does not provide.