RFID Authentication Protocol for Low-Cost Tags
This paper investigates the possible privacy and security threats to RFID systems, and considers whether previously proposed RFID protocols address these threats. The paper then proposes a new authentication protocol which provides the identified privacy and security features and is also efficient. The new protocol resists tag information leakage, tag location tracking, replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation (also under an assumption). The paper also shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.