DC FieldValueLanguage
dc.contributor.authorKnežević, Milicaen_US
dc.contributor.authorTomović, Sinišaen_US
dc.contributor.authorMihaljević, Miodrag J.en_US
dc.date.accessioned2025-11-26T13:32:56Z-
dc.date.available2025-11-26T13:32:56Z-
dc.date.issued2025-
dc.identifier.issn2327-4662-
dc.identifier.issn2372-2541-
dc.identifier.urihttp://researchrepository.mi.sanu.ac.rs/handle/123456789/5621-
dc.description.abstractIn Wireless Medical Sensor Networks (WMSNs) wearable or implantable sensors are used to collect vital body parameters, allowing remote monitoring and advanced predictive and preventive healthcare. This involves transmitting patients’ physiological data, which are sensitive and should be confidential, over the network. Thus, ensuring the security and privacy of these data is one of the most important prerequisites for the successful development of healthcare systems based on WMSN. In this regard, reliable authentication protocols designed for this specific scenario are needed. In this paper, we propose the most efficient attacks to date on the widely referenced lightweight authentication protocols for WMSNs - Wang et al.’s protocol (IEEE Internet of Things Journal, 9(11), 2022, doi: 10.1109/JIOT.2021.3117762). This protocol relies on blockchain and smart contracts to address the issue of centralization, and on Physically Unclonable Functions (PUFs) to ensure advanced physical layer security. Our attacks exploit the protocol’s vulnerabilities that stem from an inadequate use of the underlying blockchain component, unlike the previous attacks which require challenging conditions to meet, i.e. physical access to users’ mobile devices and specialized power analysis techniques. We introduce new attack scenarios and prove that Wang et al.’s protocol is vulnerable to impersonation, tracing, message replay and session key disclosure. We validate these vulnerabilities using the ProVerif tool, thereby confirming the feasibility of the attack scenarios and refuting Wang et al.’s claims regarding the protocol’s security properties. In addition, we identify and discuss other design weaknesses in Wang et al.’s proposal that further undermine its overall security and practical applicability. Finally, we revisit the feasibility of previously published attacks on Wang et al.’s protocol.en_US
dc.publisherIEEEen_US
dc.relation.ispartofIEEE Internet of Things Journalen_US
dc.subjectauthentication protocol | blockchain | physically unclonable functions (PUF) | security | smart contracts | wireless medical sensor networks (WMSN)en_US
dc.titleAttack Scenarios and Security Analysis of a Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networksen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/JIOT.2025.3612005-
dc.identifier.scopus2-s2.0-105016881069-
dc.contributor.affiliationComputer Scienceen_US
dc.contributor.affiliationMathematical Institute of the Serbian Academy of Sciences and Artsen_US
dc.relation.firstpage51010-
dc.relation.lastpage51025-
dc.relation.issue23-
dc.relation.volume12-
dc.description.rankM21a+-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextNo Fulltext-
item.openairetypeArticle-
crisitem.author.orcid0000-0002-8082-2762-
crisitem.author.orcid0000-0002-1832-3348-
crisitem.author.orcid0000-0003-3047-3020-
Show simple item record

Page view(s)

20
checked on Dec 7, 2025

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.