Research Article
[Retracted] Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals
Algorithm 1
The suggested mutual authentication protocol in the emergency mode.
| The proposed protocol in the emergency mode (Figure 7) is as follows: | (1) | Step 1 | (2) | The reader initially generates the random numbers (NR, IDR, flag = 1); | (3) | Calculate A = NR ⊕ IDR; | (4) | Broadcast M1; | (5) | Step 2 | (6) | Compare IDR; | (7) | if IDR A ⊕ NR then | (8) | Process termination; | (9) | else | (10) | { | (11) | set up V=RandPermute (); | (12) | Send M2 to reader | (13) | M2 in V; | (14) | Step 3 | (15) | for each do | (16) | if then | (17) | The reader and the tag match each other; | (18) | Calculate Kbio = H (Q || NR); | (19) | Send the message M3 = (I); | (20) | Step 4 | (21) | If the number of matched characteristics is greater than the predetermined threshold in WISP | (22) | Calculate = H (Q||NR); | (23) | if = Kbio then | (24) | if = ; | (25) | Verify success, generate random number, Calculate B = ⊕ ; | (26) | Calculate K = H ( | ), and new key K’ = H (K |); | (27) | Send S1 = M4 = | (28) | Step 5 | (29) | if Kbio (reader) = Kbio (tag), obtain (, ); | (30) | Calculate S2 = ; | (31) | if S2 = S1 then | (32) | Calculate (K, K′) K = H (), K’ = H (K |); | (33) | Send to WISP | (34) | Step 6 | (35) | WISP verifies the session keys’ equality calculated by both sides (WISP, reader) | (36) | If the session keys calculated on both sides are equal | (37) | WISP records (K′, Seq1) to awaken the IMD antenna | (38) | When IMD detects the request, begins to collect (K′, Seq1), and employs them to exchange data securely with the programmer | (39) | }; |
|