Research Article
Computer Information Processing System Based on RFID Internet-of-Things Encryption Technology
Table 5
Comparison Table of safety performance.
| | Security protocol type | Anticounterfeiting attack | Antiretransmission attack | Antitracking | Antieavesdropping |
| | Hash-lock | Uncertain | Uncertain | Uncertain | Uncertain | | Hash | Uncertain | Uncertain | Security | Uncertain | | Dynamic ID-Hash | Uncertain | Uncertain | Security | Uncertain | | GR | Uncertain | Security | Uncertain | Security | | DAP | Security | Security | Security | Security | | RandomHash-lock | Security | Uncertain | Security | Uncertain | | BAP | Security | Security | Security | Security |
|
|