Research Article
A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol
Table 8
Attack analysis with existing approaches.
| ā | Counterfeiting | Tracking | Tampering | Man-in-the-middle | Attack prevention | Attack prevention | Attack prevention | Attack prevention |
| [12] | Yes | No | Yes | Yes | [17] | No | No | Yes | No | [18] | Yes | No | Yes | Yes | [19] | Yes | No | Yes | Yes | [6] | Yes | No | Yes | Yes | Proposed design | Yes | Yes | Yes | Yes |
|
|