Skip to main content

Table 1 Efficiency analysis

From: Secure ubiquitous authentication protocols for RFID systems

Efficiency criteria   LCAP CRAP OHLCAP EOHLCAP Proposed protocols
       SUAP1 SUAP2 SUAP3
Storage Tag 1l 1l 5l 3l 2l 3l 2l
  Reader - - - - - - -
  Database 6l 1l 4l 3l 3l 4l 3l
Computation Tag 2h 3h 1h(+A 1 ) 1h(+A 2 ) 2h (+A 2 ) 2h (+A 3 ) 2h (+A 3 )
  Reader - - - - - - -
  Database 1h ( N 2 + 1 ) h 1h1 ( m i + 1 2 ) h+ ε 2 1h+ ε3 1h+ ε4 1h+ ε5
Communication Tag-to-Reader 1.5l 2l 2.5l 2.5l 2.5l 2.5l 2.5l
  Reader-to-tag 0.5l 0.5l 0.5l 0.5l 0.5l 0.5l 0.5l
  1. A 1 ,A 2 ,A 3 , additional XOR and add operations in the tag; ε1, ε2, ε3, ε4, ε5, small operations in the database