Research Article
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Table 7
Login and authentication phases of our scheme.
| | Reader | Cloud database server |
| Logs on by | | | Computes | | | Verifies | | | Generates | | | Computes | | | | Verifies , compute | | | | | | Computes | | | | | | | Verifies and | | | Extracts | | | Verifies | | | , | | | Extracts | | | Verifies | | | | | | Generates , computes | | | | | | | | | | | | | | Checks and | | Verifies and computes | Verifies | | | | | | | | Checks | | | to set as the session key | | |
|
|