Date Added: Jun 2012
Widespread adoption of RFID technology in all aspects of the people life mainly depends on the fixing the privacy concerns of this technology's customers. Using a tagged object should not lead to existence of the tracing possibility. This concern is a challenging issue that has motivated the researchers to propose several authentication protocols to fix the traceability problem in RFID systems and also provide other security requirements. In this paper, the authors analyze the security of three authentication protocols which have recently been proposed by Morshed et al. Their security analysis clearly highlights important security pitfalls in these protocols which lead to their vulnerability against traceability.