Research Article
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems
Table 3
Comparisons of different protocols’ security.
| | Attack methods | C-RAPA protocol | Chou protocol [26] | Liao protocol [27] | Xie protocol [32] |
| | Counterfeiting attack | ✓ | × | × | ✓ | | Replay attack | ✓ | ✓ | ✓ | ✓ | | Replication attack | ✓ | ✓ | ✓ | ✓ | | Forward privacy attack | ✓ | × | ✓ | ✓ | | Desynchronization attack | ✓ | ✓ | ✓ | ✓ | | Tag-tracking attack | ✓ | ✓ | × | × |
|
|