Abstract
RFID (Radio Frequency IDentification) tags are increasingly being incorporated in a wide variety of applications despite the absence of completely secure authentication protocols. While this is acceptable in some applications, there is an urgent need to address vulnerabilities in existing protocols to develop better, non-vulnerable protocols. Not surprisingly, this continues to be a very active area for research and development. Recently, the Information Systems Frontiers Journal published two papers dealing with RFID authentication protocols. The protocols introduced in these papers, however, are vulnerable to attacks from an active adversary. We identify some existing vulnerabilities in these authentication protocols.
Similar content being viewed by others
References
Piramuthu, S. (2007). Protocols for RFID Tag/Reader authentication. Decision Support Systems 43(3), 897–914.
Totty, M. (2009). Business solutions—New ways to use RFID. The Wall Street Journal, June 2.
Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2010). A lightweight anti-desynchronization RFID authentication protocol. Information Systems Frontiers. doi:10.1007/s10796-009-9216-6.
Zuo, Y. (2010). Secure and private search protocols for RFID systems. Information Systems Frontiers. doi:10.1007/s10796-009-9208-6.
Acknowledgements
The author thanks the reviewers for their constructive suggestions that have helped improve the presentation and content of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Piramuthu, S. Vulnerabilities of RFID protocols proposed in ISF. Inf Syst Front 14, 647–651 (2012). https://doi.org/10.1007/s10796-010-9291-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-010-9291-8