deployment over an extensive range of applications. Due to its several advantages, many
technical articles are published to improve its capabilities over specific system
implementations. Recently, a lightweight anti-de-synchronization RFID authentication
protocol and a lightweight binding proof protocol to guard patient safety are proposed. This
contribution provides enough evidence to prove the first introduced protocol vulnerability to …