The document discusses an RFID authentication protocol based on Generation 2 (Gen2) standards that aims to provide security and privacy. It summarizes the Gen2 protocol, introduces Duc's CRC-based protocol, and proposes a secured Gen2 protocol. This secured Gen2 protocol uses a central key stored in the backend database to authenticate tags and provides defense against tracing, skimming, and spoofing attacks through random selection of key segments and use of access passwords. Future work could focus on implementing encryption on passive tags and adapting protocols from active tags to passive tags with low computational cost.