Safety factor | Data privacy | Eavesdropping attacks | Track | Counterfeit | Replay | Desynchronization |
---|---|---|---|---|---|---|
Hash chain protocol | a | b | a | b | b | b |
Hash-based ID change protocol | a | a | a | a | a | b |
LCAP protocol | a | a | a | a | a | b |
Hu protocol | a | a | b | a | a | a |
Cho protocol | b | a | c | a | a | a |
Zheng protocol | a | a | c | a | a | a |
Improved Hash function RFID | a | a | a | a | a | a |
Passive RFID authentication protocol | a | a | a | a | a | a |