Date Added: Dec 2010
The authors identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. In support of scalability, some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings. They propose a novel scalable RFID authentication protocol based on the scheme presented in, that takes constant time to authenticate a tag. They also propose secret update protocols for tag ownership and authorisation transfer.