Research Article
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Table 8
Various queries with their descriptions.
| Query | Significance |
| CorruptTi | can extract the stored credentials by compromised tag ’s memory | Execute( , ) | This supports in intercepting communications between and | Reveal | This allows to obtain the session key from and its partner | Test | It allows to request for the session key and is probably a consequence of a flickered “unbiased coin ” output |
|
|