Research Article

A Secure RFID Authentication Protocol Adopting Error Correction Code

Table 3

Comparison of security properties.

Our Protocol
Chien’s Chien and Laih’s Juels and Weis’s Sun and Ting’s
[29] [30] [19] [26]

Authenticity
Integrity
Forward secrecy
Anonymity
Untraceability
Resistance to compromising
Resistance to desynchronizing

: satisfied; : unsatisfied.