Research Article
Secure Lightweight IoT Integrated RFID Mobile Healthcare System
Table 5
Comparison of existing mechanisms.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ev: eavesdropping; Im: impersonation; Ra: replay attack; Fs: forward security; Ma: mutual authentication; Pe: performance; Lo: less; Be: better. |