2007
DOI: 10.1007/978-3-540-72354-7_14
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies

Abstract: Abstract.A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor network node technologies. The goal of this research was to determine "Security Lessons" learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…The paper [ 11 ] summarizes the comparative analysis of common threats, vulnerabilities, attacks and applied measures for two areas: smart card/RFID technology and wireless sensor network node technology. The assumed TVAC security model (Threat-Vulnerability-Attacker-Countermeasure) can be useful to define properly threat items in the methodology presented below.…”
Section: Intelligent Sensors and Their Basic Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…The paper [ 11 ] summarizes the comparative analysis of common threats, vulnerabilities, attacks and applied measures for two areas: smart card/RFID technology and wireless sensor network node technology. The assumed TVAC security model (Threat-Vulnerability-Attacker-Countermeasure) can be useful to define properly threat items in the methodology presented below.…”
Section: Intelligent Sensors and Their Basic Security Issuesmentioning
confidence: 99%
“…The paper [ 11 ] points at similarities between the smart card/RFID technology and wireless sensor network node technology with respect to threats, vulnerabilities, attacks and applied measures. Because the smart card/RFID solutions group is one of the most numerous groups of certified IT products or systems [ 24 ], the published security specifications for these solutions can be helpful for wireless sensor developers as well as with respect to the above mentioned risk management issues, i.e.…”
Section: Intelligent Sensors and Their Basic Security Issuesmentioning
confidence: 99%
“…A threat model or attack tree can be used to deduce necessary SCs at the beginning of the system's design phase. We derived a list of SCs for the software implementation of a smart card from attacks described in [7,8,9,10]. The list below is not exhaustive but should indicate how the concept of SCs works.…”
Section: Definition Of Security Constraintsmentioning
confidence: 99%
“…There are several possibilities for a self-test mechanism in a UCTD including using active (intelligent) shield/mesh [115], the Known Answer Test (KAT) [113], and the Physical Unclonable Function (PUF) [116].…”
mentioning
confidence: 99%