Research Article

[Retracted] Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals

Algorithm 3

Secure communication protocol between the IMD and the programmer.
The programmer can use the session key calculated by the protocol to establish the secure communication after IMD authenticates the programmer in Figure 9.
(1)Step 1:
(2)The reader initially generates (K, C = IDRNR) and transmits the values  = (NR, C, flag, HMAC (K, NR | IDR)) to the WISP.
(3)Step 2:
(4)The IMD returns Nbr and updates IDR = CNR.
(5)Step 3:
(6)If the key is valid then
(7)The WISP selects NW and transmits the values =((Nbr, NW, IDW), HMAC (K, NR| NW|IDW)) to the reader.
(8)else
(9)The WISP transmits the sequences (Deny, flag) to the reader.
(10)Step 4:
(11)The WISP updates K′ = PRNG (K | NW), and the reader updates K′ = PRNG (K | NW) and K1 = K’Nbr. The reader sends the value M3 = (Seq1, HMAC (K′, NW, Seq1)) to the WISP and sends the messages (K1, Seq1) to the programmer.
(12)Step 5:
(13)The WISP identifies K′ by comparing the value K′ of the WISP with the K′ value of the reader. The WISP updates Nbr, K1 = K’Nbr, and sends (K1, Seq1, Nbr) to the IMD.