“…For instance, recently, multiple authors have been able to emulate communications protocols and reverse-engineer cryptographic algorithms using, in most cases, low-cost equipment [ 21 , 22 , 23 , 24 , 25 ]. Figure 1 contains references to the latest analysis about possible attacks on RFID in IoT applications for specific fields like healthcare [ 26 , 27 , 28 , 29 ], defense and public safety [ 30 , 31 ], energy [ 32 ], vehicle access [ 33 , 34 ], retail [ 27 ], assisted-living [ 35 , 36 ], smart cities [ 37 ], Industry 4.0 [ 38 , 39 , 40 , 41 ], ticketing [ 42 , 43 , 44 , 45 , 46 ], or smart farming [ 47 ].…”