Research Article
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
Table 6
Security comparison (√: provide, X: do not provide, and —: not mentioned).
| | Security services and attacks | Liao and Hsiao [19] | Zhao [22] | Chou [23] | Zhang and Qi [24] | Our study |
| | Mutual authentication | X | √ | X | √ | √ | | Tracking attack | X | — | — | — | √ | | Traceability | X | — | X | — | √ | | Location privacy | X | √ | X | — | √ | | Information privacy | X | — | X | √ | √ | | Desynchronization attack | — | — | — | √ | √ | | Denial-of-service (DoS) attack | √ | √ | √ | √ | √ | | Availability | √ | √ | — | — | √ | | Tag anonymity | √ | X | — | √ | √ | | Eavesdropping | — | — | — | — | √ | | Man-in-the-middle | — | — | X | √ | √ | | Impersonation attack | X | √ | X | √ | √ | | Reader spoofing attack | X | √ | — | √ | √ | | Cloning attacks | √ | √ | — | — | √ | | Full disclosure attacks | — | — | — | — | √ | | Replay attacks | √ | √ | √ | √ | √ | | Confidentiality | √ | — | — | — | √ | | Integrity | — | — | — | — | √ | | Modification attack | — | — | — | √ | √ | | Unforgeability attack | — | — | — | — | √ | | Forward security | X | X | X | X | √ | | Backward security | X | X | X | X | √ |
|
|