Download Now Free registration required
Radio Frequency IDentification (RFID), which can be implemented in various applications, has become one of the most popular technologies for remote, automatic identification. Currently, many scientific researchers are focused on this issue with the goal of achieving high security and privacy protection. Recently, Chen et al. proposed an RFID access control protocol that can satisfy the practical requirements of the authentication mechanism and infrastructure for access authorization. In this paper, the authors demonstrate that Chen et al.'s protocol cannot validate the legitimacy of tag when replay attacks occur. Moreover, their analysis indicated that location privacy and forward secrecy are not well protected in this protocol.
- Format: PDF
- Size: 222.75 KB