“…• Desynchronization: This is an active attack in which a malicious adversary tries to cause the tag and the reader to update inconsistent values and make tag disabled [11]. In recent years, many researchers have tried to propose lightweight and secure authentication protocols [12,13,14,15,16,17,18,19,20,21,22,23,24], but unfortunately many vulnerabilities have been found in their schemes [25,26,27,28,29,30,31,32,33,34,35,36,37,38]. Recently Fu et al [39] proposed a scalable RFID mutual authentication and Li et al [40] suggested a mutual authentication protocol for RFID communication.…”