This attack requires a single protocol session
between the RFID reader and the RFID tag. Finally, we
analyze the privacy of the ownership transfer protocol and
show that it does not in fact provide tag privacy against the
old owner of the tag after a successful transfer protocol.
The rest of this paper is organized as follows. In Section
2, we review the related work. In Section 3, We describe the
lightweight mutual authentication proposed by Kulseng et al.
[12] and our attacks on the protocol. In Section 4, we describe
their ownership transfer protocol (OTP) and our attack on this
protocol. Section 5 concludes the paper.