Research Article
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems
Table 1
Symbols used in the C-RAPA protocol.
| Symbols | Representations |
| | The camouflage identifier of the reader in the -th authentication process, with the length of | | The camouflage identifier of the tag in the -th authentication process, with the length of | | Random number generated by the reader in the authentication process, with the length of | | Random number generated by the tag in the authentication process, with the length of | | Random number generated by the cloud-based database in the authentication process, with the length of | | In the -th session, the shared key used between the tag and the cloud-based database, with the length of | | In the -th session, the shared key used between the reader and the cloud-based database, with the length of | | XOR operation by bit | | One-way hash encryption operation of | | Get the response from PUF module when input | | AES encryption of data with the key | | AES decryption of data with the key |
|
|