Skip to Main Content
Although several mutual authentication protocols which use a back-end server to retrieve a tagpsilas data have been proposed in RFID systems, many of them do not take the resources of back-end server into consideration. They use sequential search in database to carry out the authentication process. In this paper, we survey the existing mutual authentication protocols for RFID systems and propose some remedies for these protocols especially with a special focus on the sequential search problem. After they are remedied, these protocols not only keep their properties such as anonymity and privacy but also increase the performance on the database search in the back-end server.