Applied Mathematics & Information Sciences

Author Country (or Countries)



The radio frequency identification (RFID) protocols are vulnerable to various attacks from an active or passive adversary. We shed light upon some existing security flaws in these delegation protocols. It is useful to mitigate many security weaknesses in such delegation protocols to promote the acceptance of RFID tags.We propose that a scalable RFID delegation protocol will be against traceability attacks with a stateful variant so that it provides the claimed security requirements. Compared with the previous schemes, we emphasize three critical distinctions in our protocol. First, the reader and the tag decrease one bitwise XOR of the message and reduce the computational complexity. Second, a solution to reducing the maximum search complexity can be that add two different flags to the tags responses in order to distinguish delegation request from delegation update. Third, the number of exchanged flows during different cases of our revision is same. Finally, the proposed scheme achieves scalability and untraceability property without leading to a security collision.

Suggested Reviewers


Digital Object Identifier (DOI)