Research Article

[Retracted] Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals

Algorithm 1

The suggested mutual authentication protocol in the emergency mode.
The proposed protocol in the emergency mode (Figure 7) is as follows:
(1)Step 1
(2)The reader initially generates the random numbers (NR, IDR, flag = 1);
(3)Calculate A = NR ⊕ IDR;
(4)Broadcast M1;
(5)Step 2
(6)Compare IDR;
(7)  if IDR A ⊕ NR then
(8)   Process termination;
(9)  else
(10) {
(11)  set up V=RandPermute ();
(12) Send M2 to reader
(13)M2 in V;
(14)Step 3
(15) for each do
(16)  if then
(17)   The reader and the tag match each other;
(18)   Calculate Kbio = H (Q || NR);
(19)Send the message M3 = (I);
(20)Step 4
(21)If the number of matched characteristics is greater than the predetermined threshold in WISP
(22)Calculate  = H (Q||NR);
(23)  if  = Kbio then
(24)   if  = ;
(25)  Verify success, generate random number, Calculate B =  ⊕ ;
(26)Calculate K = H ( | ), and new key K’ = H (K |);
(27)Send S1 =  M4 = 
(28)Step 5
(29)if Kbio (reader) = Kbio (tag), obtain (, );
(30) Calculate S2 = ;
(31)if S2 = S1 then
(32) Calculate (K, K′) K = H (), K’ = H (K |);
(33)Send to WISP
(34)Step 6
(35)WISP verifies the session keys’ equality calculated by both sides (WISP, reader)
(36)If the session keys calculated on both sides are equal
(37)WISP records (K′, Seq1) to awaken the IMD antenna
(38)When IMD detects the request, begins to collect (K′, Seq1), and employs them to exchange data securely with the programmer
(39) };