Research Article
[Retracted] Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals
Table 3
The comparisons of the performance analysis and safety performance.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
F0: provision of scalability and efficiency; F1: storage cost (tag); F2: blockchain-enabled; F3: cloud computing-enabled; F4: fog computing-enabled. R1: key leak attacks resistance; R2: replay attacks resistance; R3: desynchronization attacks resistance; R4: reader impersonation attacks resistance; R5: tracking attacks resistance; R6: tag impersonation attacks resistance. |