This paper presents a survey on several RFID authentication protocols under low cost limitation. Different approaches under low cost restriction have been proposed by several protocols in order to satisfy security and privacy of RFID. In this survey all protocols are examined according to three aspects, namely data protection. tracking prevention, and forward security, finally, it is conclude that there is no single protocol capable to fully satisfy the there security and privacy aspects and that they offer different level of low cost security and provacy protection.
|
|