Research Article
A Secure RFID Authentication Protocol Adopting Error Correction Code
Algorithm 1
The proposed protocol.
(1) : Compute = + , where | | Generate a random challenge | (2) : , | (3) : Compute = | IF satisfies any pattern in | Generate a random challenge | Compute = + , where | | | ELSE | Set = random value | Set = random value | (4) : | (5) : Decode | IF can be decoded | Verify to authenticate | IF is correct | | ELSE | Set = random value | ELSE | Set = random value | Ignore | (6) : | (7) : Verify to authenticate |
|