Research Article
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Table 11
Comparison of security features.
| Security attributes | [7] | [3] | [4] | [2] | [11] | Our |
| Traceability preservation | | | | | | | Suitable for cloud environments | | | | | | | Password guessing attack | | | | | | | Privileged-insider attack | | | | | | | User anonymity preservation | | | | | | | Relay attack | | | | | | | Replay attack | | | | | | | Impersonation attacks | | | | | | | Denial-of-service attack | | | | | | | Message authentication | | | | | | | Mutual authentication | | | | | | | Man-in-the-middle attack | | | | | | | ESL attack | | | | | | | Session key agreement | | | | | | | Desynchronization attack | | | | | | | Revocability | | | | | | | Free password/biometric change | | | | | | | Security attributes achieved | 9 | 15 | 15 | 10 | 12 | 18 |
|
|