Research Article
A Secure RFID Authentication Protocol Adopting Error Correction Code
Table 3
Comparison of security properties.
| | Our Protocol
| Chien’s | Chien and Laih’s | Juels and Weis’s | Sun and Ting’s | [29] | [30] | [19] | [26] |
| Authenticity | ✓ | ✓ | ✓ | ✗ | ✗ | Integrity | ✓ | ✓ | ✓ | ✓ | ✓ | Forward secrecy | ✓ | ✓ | ✓ | ✗ | ✓ | Anonymity | ✓ | ✓ | ✓ | ✓ | ✓ | Untraceability | ✓ | ✗ | ✗ | ✓ | ✓ | Resistance to compromising | ✓ | ✓ | ✓ | ✓ | ✓ | Resistance to desynchronizing | ✓ | ✗ | ✓ | ✓ | ✓ |
|
|
✓: satisfied; ✗: unsatisfied.
|