Research Article

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

Table 6

Security comparison (√: provide, X: do not provide, and —: not mentioned).

Security services and attacks Liao and Hsiao [19]Zhao [22]Chou [23]Zhang and Qi [24]Our study

Mutual authenticationXX
Tracking attackX
TraceabilityXX
Location privacyXX
Information privacyXX
Desynchronization attack
Denial-of-service (DoS) attack
Availability
Tag anonymityX
Eavesdropping
Man-in-the-middleX
Impersonation attackXX
Reader spoofing attackX
Cloning attacks
Full disclosure attacks
Replay attacks
Confidentiality
Integrity
Modification attack
Unforgeability attack
Forward securityXXXX
Backward securityXXXX