\begin{enumerate} \item Tag impersonation attack. \item Reader impersonation attack. \item Location traceability attack. \end{enumerate} All attacks presented in this paper have the success probability of '1' on the cost of only one or two runs of protocol.
Category / Keywords: cryptographic protocols / RFID, Access Control, Spoofed Reader Attack, Authentication, Desynchronization Attack. Date: received 15 Apr 2011, last revised 15 Apr 2011 Contact author: nbagheri at srttu edu, na bagheri@gmail com Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20110425:191839 (All versions of this report) Discussion forum: Show discussion | Start new discussion