The computational cost of the existing RFID security protocols is high or the existing protocols can ' t defense the all kinds of the popular RFID attacks, a secret identity and one- way hash function based highlight security protocol. In the first phase, tag registers to dataset, dataset assigns a one- time secret identity and one unique secret key to the tag; in the second phase, the mutual authentication of tag- reader- dataset is processed by one- time secret identity and one- way hash function, and the...