Review Article

Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags

Table 12

Comparative security analysis of UMAPs.

ProtocolDesynchronization AttackTraceability AttackFull Disclosure Attack

LMAP[57][58, 59][57]

M2AP[57][60][57]

EMAP[61][60][61]

SASI[62][63][55, 64, 65]

Gossamer’s Protocol[66][60][67]

Yeh et al.’s Protocol[34][60][64, 65, 68]

RAPP[42, 69][45, 70][24, 67]

RAPLT[34]- -[71]

RCIA[34][72]- -

SLAP[34][73]- -