Skip to Main Content
RFID-based systems are becoming a widely deployed pervasive technology that is more and more used in applications where privacy sensitive information is entrusted to RFID tags. A secure RFID system should provide untraceability (preventing unauthorized tag tracking) and authentication (preserving the confidentiality). In this paper, we give the security analysis of two type of recently proposed RFID authentication protocols, one assuming the tag can compute hash functions and the other utilizing anonymizer to provide anonymity. The analysis shows that the two protocols can not resist tracking attack and desynchronization attack.