Skip to main content

Table 1 Differences in attack mitigation effects of protocols

From: RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

Safety factor

Data privacy

Eavesdropping attacks

Track

Counterfeit

Replay

Desynchronization

Hash chain protocol

a

b

a

b

b

b

Hash-based ID change protocol

a

a

a

a

a

b

LCAP protocol

a

a

a

a

a

b

Hu protocol

a

a

b

a

a

a

Cho protocol

b

a

c

a

a

a

Zheng protocol

a

a

c

a

a

a

Improved Hash function RFID

a

a

a

a

a

a

Passive RFID authentication protocol

a

a

a

a

a

a

  1. a indicates that the protocol can withstand the current attack; b indicates that the protocol cannot withstand the current attack; c indicates that the protocol can resist some current attacks