Research Article

[Retracted] Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals

Table 3

The comparisons of the performance analysis and safety performance.

PerformanceProtocol 1Protocol 3Protocol 2Protocol 4Protocol 5

F0NoYesNoYesNo
F13H + Xor3PRNG + Xor2H + Xor2PRNG + Xor1PRNG+2Xor
F2NoYesNoYesYes
F3NoYesNoYesYes
F4NoYesNoYesYes

Attack typesProtocol 1Protocol 3Protocol 2Protocol 4Protocol 5

R1NoYesNoYesNo
R2YesYesYesYesYes
R3YesYesYesYesYes
R4YesYesYesYesYes
R5NoYesNoYesYes
R6NoYesYesYesYes

F0: provision of scalability and efficiency; F1: storage cost (tag); F2: blockchain-enabled; F3: cloud computing-enabled; F4: fog computing-enabled. R1: key leak attacks resistance; R2: replay attacks resistance; R3: desynchronization attacks resistance; R4: reader impersonation attacks resistance; R5: tracking attacks resistance; R6: tag impersonation attacks resistance.