Research Article
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
Table 6
Security comparison (√: provide, X: do not provide, and —: not mentioned).
| Security services and attacks | Liao and Hsiao [19] | Zhao [22] | Chou [23] | Zhang and Qi [24] | Our study |
| Mutual authentication | X | √ | X | √ | √ | Tracking attack | X | — | — | — | √ | Traceability | X | — | X | — | √ | Location privacy | X | √ | X | — | √ | Information privacy | X | — | X | √ | √ | Desynchronization attack | — | — | — | √ | √ | Denial-of-service (DoS) attack | √ | √ | √ | √ | √ | Availability | √ | √ | — | — | √ | Tag anonymity | √ | X | — | √ | √ | Eavesdropping | — | — | — | — | √ | Man-in-the-middle | — | — | X | √ | √ | Impersonation attack | X | √ | X | √ | √ | Reader spoofing attack | X | √ | — | √ | √ | Cloning attacks | √ | √ | — | — | √ | Full disclosure attacks | — | — | — | — | √ | Replay attacks | √ | √ | √ | √ | √ | Confidentiality | √ | — | — | — | √ | Integrity | — | — | — | — | √ | Modification attack | — | — | — | √ | √ | Unforgeability attack | — | — | — | — | √ | Forward security | X | X | X | X | √ | Backward security | X | X | X | X | √ |
|
|