Research Article

A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems

Table 1

Symbols used in the C-RAPA protocol.

SymbolsRepresentations

The camouflage identifier of the reader in the -th authentication process, with the length of
The camouflage identifier of the tag in the -th authentication process, with the length of
Random number generated by the reader in the authentication process, with the length of
Random number generated by the tag in the authentication process, with the length of
Random number generated by the cloud-based database in the authentication process, with the length of
In the -th session, the shared key used between the tag and the cloud-based database, with the length of
In the -th session, the shared key used between the reader and the cloud-based database, with the length of
XOR operation by bit
One-way hash encryption operation of
Get the response from PUF module when input
AES encryption of data with the key
AES decryption of data with the key