| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Knežević, Milica | en_US |
| dc.contributor.author | Tomović, Siniša | en_US |
| dc.contributor.author | Mihaljević, Miodrag J. | en_US |
| dc.date.accessioned | 2025-11-26T13:32:56Z | - |
| dc.date.available | 2025-11-26T13:32:56Z | - |
| dc.date.issued | 2025 | - |
| dc.identifier.issn | 2327-4662 | - |
| dc.identifier.issn | 2372-2541 | - |
| dc.identifier.uri | http://researchrepository.mi.sanu.ac.rs/handle/123456789/5621 | - |
| dc.description.abstract | In Wireless Medical Sensor Networks (WMSNs) wearable or implantable sensors are used to collect vital body parameters, allowing remote monitoring and advanced predictive and preventive healthcare. This involves transmitting patients’ physiological data, which are sensitive and should be confidential, over the network. Thus, ensuring the security and privacy of these data is one of the most important prerequisites for the successful development of healthcare systems based on WMSN. In this regard, reliable authentication protocols designed for this specific scenario are needed. In this paper, we propose the most efficient attacks to date on the widely referenced lightweight authentication protocols for WMSNs - Wang et al.’s protocol (IEEE Internet of Things Journal, 9(11), 2022, doi: 10.1109/JIOT.2021.3117762). This protocol relies on blockchain and smart contracts to address the issue of centralization, and on Physically Unclonable Functions (PUFs) to ensure advanced physical layer security. Our attacks exploit the protocol’s vulnerabilities that stem from an inadequate use of the underlying blockchain component, unlike the previous attacks which require challenging conditions to meet, i.e. physical access to users’ mobile devices and specialized power analysis techniques. We introduce new attack scenarios and prove that Wang et al.’s protocol is vulnerable to impersonation, tracing, message replay and session key disclosure. We validate these vulnerabilities using the ProVerif tool, thereby confirming the feasibility of the attack scenarios and refuting Wang et al.’s claims regarding the protocol’s security properties. In addition, we identify and discuss other design weaknesses in Wang et al.’s proposal that further undermine its overall security and practical applicability. Finally, we revisit the feasibility of previously published attacks on Wang et al.’s protocol. | en_US |
| dc.publisher | IEEE | en_US |
| dc.relation.ispartof | IEEE Internet of Things Journal | en_US |
| dc.subject | authentication protocol | blockchain | physically unclonable functions (PUF) | security | smart contracts | wireless medical sensor networks (WMSN) | en_US |
| dc.title | Attack Scenarios and Security Analysis of a Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks | en_US |
| dc.type | Article | en_US |
| dc.identifier.doi | 10.1109/JIOT.2025.3612005 | - |
| dc.identifier.scopus | 2-s2.0-105016881069 | - |
| dc.contributor.affiliation | Computer Science | en_US |
| dc.contributor.affiliation | Mathematical Institute of the Serbian Academy of Sciences and Arts | en_US |
| dc.relation.firstpage | 51010 | - |
| dc.relation.lastpage | 51025 | - |
| dc.relation.issue | 23 | - |
| dc.relation.volume | 12 | - |
| dc.description.rank | M21a+ | - |
| item.cerifentitytype | Publications | - |
| item.grantfulltext | none | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
| item.fulltext | No Fulltext | - |
| item.openairetype | Article | - |
| crisitem.author.orcid | 0000-0002-8082-2762 | - |
| crisitem.author.orcid | 0000-0002-1832-3348 | - |
| crisitem.author.orcid | 0000-0003-3047-3020 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.