The recent practical deployment of radio frequency identification (RFID) technologies is becoming widespread in almost all kinds of wireless network-based applications. As anticipated, most of the applications based on sensor networks, ad-hoc and or mobile ad hoc networks (MANETs) can highly benefit from the adoption of RFID solutions. RFID tags store valuable information and can easily be subjected to unauthorized reading, tempering with and possible other uses, which can lead to many unknown activities. RFID tags are also vulnerable to different forms of relay attacks. In this article, we present a probabilistic approach to check and verify the flexibility of the RFID protocols against possible relay attacks, channels and application specific parameters are also considered in the analysis. Then we show how an attack can be avoided. Future work is presented at the conclusion.