International Journal of Network Security
Many security and privacy protocols for RFID systems have been proposed. In most cases these protocols are evaluated in terms of security based on some model. Often the model was introduced by the creator of the protocol, in some cases borrowing parameters from the protocol for model parameters. Moreover, the models that are discussed may represent only one aspect of the necessary security services that are needed in an RFID system. Here the authors describe several of the security requirements that are needed in an RFID system. Further, they model these requirements.