Research Article
A Secure RFID Authentication Protocol Adopting Error Correction Code
Table 8
Comparison of total messages transmitted.
| Authentication protocol | Total amount of transmitted messages (bit) | | | |
| Our protocol | | | | Chien’s SASI [29] | | | | Chien and Laih’s ECC-based [30] | | | | Juels and Weis’s HB+ [19] | | | | Sun and Ting’s Gen2+ [26] | | | |
|
|
: number of tags; : key length; : number of rounds; : length of random number.
|