| RFID systems have the advantages of fast scanning, small size, diverse shapes, contamination resistance durability and reusability. That makes it have broad applications and great value in military field, civil manufacturing and environmental monitoring. However, it has its own special characteristics, low computing ability and limitation of energy, so its security level is relatively low. Therefore, how to design a safe and reliable RFID system, with high performance, is still a challenging task.Firstly, in this paper, we briefly introduce the basic concepts of RFID systems and its special applications. Followed by a brief description of the privacy issues and present the current state of researches of RFID systems. Secondly, study and analysis the symmetric key based authentication protocol (SKRAP) with a key update. According to the principle of cerytographic analysis, this protocol has some issues. It declares tracking attack, replay attack, desynchronization attack and so on, but they can not get the proper level of security. While the improved anthentication protocol, ISKRAP, add timestamp in server and tag to gain needed security level; Again, we study and analysis the elliptic curve-based RFID authentication protocol (ECRAP). Through detailed analysis of the related security problems and authentication processes, we find that it can’t resist a special desynchronization attack, while there is also the risk of electronic fraud. The improved authentication protocol(IECRAP) keep two-round shared key in server and tag. It can not only obtain the old security level, but also resist the special desynchronization attack. Finally, we study and analysis an efficient and secure RFID authentication protocol(ESAP). As the application environment and the authentication process stated, we find it can’t resist a common tracking attacks. The improved authentication protocol(IESAP) increase the complexity of fifth information to resist tracking attack. In this paper, we mainly study the problem of authentication protocol in RFID systems, to achieve the desired security level we analyze and improve the authentication process. While we try to minimize the cost of implementation and improve the usable range of the technology. |