Skip to main content

Table 2 Security comparison among related protocols

From: Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment

Item

Proposed scheme

Farash et al. [7]

Alamr et al. [35]

Zhang and Qi [26]

Zhao [3]

Shen et al. [28]

Liao and Hsiao [36]

Confidentiality

Yes

Yes

Yes

Yes

Yes

Yes

No

Avoiding insider attack

Yes

Yes

Yes

Yes

Yes

–

No

Avoiding forgery attack

Yes

Yes

Yes

Yes

Yes

–

No

Mutual authentication

Yes

Yes

Yes

Yes

Yes

Yes

No

Forwards security

Yes

Yes

Yes

No

No

Yes

No

Avoiding replay attack

Yes

Yes

Yes

Yes

Yes

–

Yes

Masquerade attack

Yes

No

No

No

No

No

No

Avoiding man-in-the-middle attack

Yes

Yes

Yes

Yes

Yes

–

Yes