It is well-known that protocols that satisfy a security property when
executed in isolation do not necessarily satisfy the same security
property when they are executed in an environment containing other
protocols.
We demonstrate this fact on a family of recently proposed RFID
protocols by Lee, Batina, and Verbauwhede. We invalidate the authentication and untraceability claims made for several of the family\u27s protocols.
We also present man-in-the-middle attacks on untraceability in all of the protocols in the family. Similar attacks can be carried out on some other protocols in the literature, as well.
We briefly indicate how to repair the protocols