“…In RFID systems, to achieve one-end or mutual authentication, readers and tags may employ authentication protocols (e.g. [9], [10], [11], [12], [13]). Despite recent advances in the domain of RFID communication, the design of secure authentication protocols has remained as a challenge yet [14], given the constraints of those devices, e.g.…”