Owing to the individual privacy, system security and resource limitation of low-cost RF tag, ultralightweight RFID authentication has been massively investigated in these years. Recently, Kianersi et al.  and Lee et al.  proposed two well-studied RFID authentication schemes which attempt to achieve data confidentiality and tag computation efficiency. However, these two protocols are vulnerable as the shared secrets can be out of synchronization via a series of challenge-response operations. In this paper, we demonstrate the detailed malicious procedures on these two mechanisms and show their vulnerabilities.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 firstname.lastname@example.org
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 email@example.com