Research Article

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Table 8

Various queries with their descriptions.

QuerySignificance

CorruptTi can extract the stored credentials by compromised tag ’s memory
Execute( , )This supports in intercepting communications between and
Reveal This allows to obtain the session key from and its partner
Test It allows to request for the session key and is probably a consequence of a flickered “unbiased coin output