The document presents RMAC, a lightweight authentication protocol specifically designed for highly constrained IoT devices, which utilizes simple, efficient algorithms to ensure data security and privacy. Inspired by the Mirror-MAC (MM) protocol, RMAC operates securely against man-in-the-middle attacks, while also incorporating a lightweight key establishment method to renew keys for each session. The proposal highlights its advantages over previous protocols that either had security flaws or high costs unsuitable for constrained environments.