[Retracted] Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals
Algorithm 2
The proposed mutual authentication protocol in the regular mode.
The proposed mutual authentication protocol in the regular mode is in Figure 8 as follows:
(1)
Step 1
(2)
The reader generates (NR, IDR, flag = 0);
(3)
Calculate A = IDR ⊕ NR and K = H (NR|IDR);
(4)
Transmit =
(5)
When WISP receives the request, it confirms that the primary key is expired and verifies that how many session keys which originated from the primary key exceeds the predetermined threshold
(6)
if t < T then
If the primary key has not expired, WISP receives the messages
(7)
else the key expired, access denied;
(8)
Step 2
(9)
After WISP successful authentication, the random number is generated;
(10)
Calculate K’ = H (K | ), B= IDW ⊕ NW;
(11)
Transmit =
Calculate S1 = ;
(12)
Step 3
(13)
After receiving the messages, the reader starts to parse the first part of the message through the key K to obtain (Nbr, NW, IDW);
(14)
Calculate S2 = ;
If S2 = S1 then
The message is true;
Calculate K’ = PRNG (K |),K1 = K’ ⊕ NR;
(15)
Transmit =
(16)
Step 4
(17)
Based on the received HMAC, WISP can confirm the timeliness of the message and the equality of the session keys calculated on both sides
(18)
After verifying successfully, Nbr++, K2 = = K’ ⊕ NW;
(19)
WISP records (K2, Seq1, Nbr) to awaken the IMD antenna
(20)
When IMD detects the request, collects (K1, Seq1), and employs them to exchange data securely with the programmer.