Research Article
The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security
Table 2
The comparison of some typical grouping-proof protocols with our protocols.
| Protocols | Privacy | Anonymity | Trace attack | Replay attack | Forward security | DoS attack | The number of tag groups |
| Ref. [2] | ✕ | ✕ | ✕ | ✕ | ✕ | — | One (only two tags) | Ref. [15] | ✓ | ✓ | ✓ | ✓ | ✓ | ✕ | One | Ref. [16] | ✕ | ✕ | ✕ | ✓ | ✓ | ✕ | Multiple | Ref. [18] | ✓ | ✓ | ✓ | ✓ | ✕ | — | One (only two tags) | Ref. [19] | ✓ | ✓ | ✕ | ✓ | ✕ | — | One (only two tags) | Ours | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Multiple |
|
|