On the traceability of tags in SUAP RFID authentication protocols
Paper i proceeding, 2012
RFID technology is one of the most pervasive computing technologies with important advantages and a wide range of applications. Nevertheless, the widespread adoption of RFID technology mainly depends on fixing the security and privacy concerns of this technology. Using a tagged object should not lead to the traceability of this object. This concern is a challenging issue that has motivated the proposal of several authentication protocols that attempted to fix the traceability problem. In this paper, we analyze the security of three authentication protocols that have been recently proposed by Morshed et al. . Our security analysis clearly highlights important security pitfalls in these protocols that lead to their vulnerability against traceability. The proposed attacks require only several runs of the protocols while the adversary's advantages to trace the tagged object are maximal. © 2012 IEEE.