However,
we show that their protocols have several weaknesses which
compromise the overall security. We highlight that suitable
lightweight security protocols for low-cost RFID tags should
be carefully designed with a detailed security analysis. Due
to the limited constraints of RFID systems and despite the
interesting suggestions in the literature in this area it is still a
big challenge to design a fully secure and efficient scheme.