attacks; authentication; rapp; rfid security; authentication; computer networks; information systems; attacks; de-synchronization attacks; rapp; rfid authentication protocols; rfid mutual authentication protocols; rfid security; traceability attacks; ultra lightweights; radio frequency identification (rfid)