Research Article

The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security

Table 2

The comparison of some typical grouping-proof protocols with our protocols.

ProtocolsPrivacyAnonymityTrace attackReplay attackForward securityDoS attackThe number of tag groups

Ref. [2]One (only two tags)
Ref. [15]One
Ref. [16]Multiple
Ref. [18]One (only two tags)
Ref. [19]One (only two tags)
OursMultiple