Radio based technologies are subject to various types of attacks as it happens for any technology that utilizes
the wireless communication channels. As a result, RFID systems are subject to attacks that threaten system
security and user privacy. To overcome security and privacy problems, we have to develop protecting
technologies and apply countermeasures that prevent tag misuse. An overview of potential RFID privacy and
security threats is reported in [35]. In eavesdropping, the communication channel is used to secretly monitor data
transmitted between RFID tag and RFID reader. Data can be encrypted, the distance between the tag and the
reader can be limited, and the tag and reader can be shielded during transmission. These techniques can also be