“…While every year, counterfeit goods account for 7RFID tag counterfeiting can be defined as creating a replica of a tag by either replicating the hardware component of a tag or by copying its software in such a way that the genuine reader, database, or users would not know the difference between the genuine tag and the replicated one. Recently, we proposed a framework to prevent counterfeiting [3]; this was not the first work as one of the recent novels was a system proposed by [4] and consists of a tag authentication protocol, which has four key players, namely the RFID tag, the reader, the server, and the seller, and the database correction protocol, which has two players, namely the seller and the server. The first protocol authenticates the tags without revealing their sensitive information and allows the customer to inquire whether the tag is genuine or not.…”