Classifying RFID attacks and defenses