Skip to main content
Log in

Vulnerabilities of RFID protocols proposed in ISF

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

RFID (Radio Frequency IDentification) tags are increasingly being incorporated in a wide variety of applications despite the absence of completely secure authentication protocols. While this is acceptable in some applications, there is an urgent need to address vulnerabilities in existing protocols to develop better, non-vulnerable protocols. Not surprisingly, this continues to be a very active area for research and development. Recently, the Information Systems Frontiers Journal published two papers dealing with RFID authentication protocols. The protocols introduced in these papers, however, are vulnerable to attacks from an active adversary. We identify some existing vulnerabilities in these authentication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Piramuthu, S. (2007). Protocols for RFID Tag/Reader authentication. Decision Support Systems 43(3), 897–914.

    Article  Google Scholar 

  • Totty, M. (2009). Business solutions—New ways to use RFID. The Wall Street Journal, June 2.

  • Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2010). A lightweight anti-desynchronization RFID authentication protocol. Information Systems Frontiers. doi:10.1007/s10796-009-9216-6.

    Google Scholar 

  • Zuo, Y. (2010). Secure and private search protocols for RFID systems. Information Systems Frontiers. doi:10.1007/s10796-009-9208-6.

    Google Scholar 

Download references

Acknowledgements

The author thanks the reviewers for their constructive suggestions that have helped improve the presentation and content of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Selwyn Piramuthu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Piramuthu, S. Vulnerabilities of RFID protocols proposed in ISF. Inf Syst Front 14, 647–651 (2012). https://doi.org/10.1007/s10796-010-9291-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-010-9291-8

Keywords

Navigation