A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies

A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor network node technologies. The goal of this research was to determine "Security Lessons" learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa.

[1]  Bruce Potter Threat Modelling: Microsoft SDL Threat Modelling Tool , 2009 .

[2]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[3]  Serge Chaumette,et al.  Secure distributed computing on a Java Card/spl trade/ grid , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[4]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[5]  P. Kumarawadu,et al.  Secure Routing in Sensor Networks , 2007, 2007 Canadian Conference on Electrical and Computer Engineering.

[6]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[7]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[8]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[9]  Chih-Chun Chang,et al.  Security in Wireless Sensor Networks : Status, Problems, Current Technologies and Trends , 2006 .

[10]  Viktor K. Prasanna,et al.  Issues in designing middleware for wireless sensor networks , 2004, IEEE Network.

[11]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[12]  Sanjay Kumar Madria,et al.  Sensor networks: an overview , 2003 .

[13]  Ericsson Hungary,et al.  SECURITY ANALYSIS OF SENSOR NETWORKS , 2005 .

[14]  Jose A. Gutierrez,et al.  Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensors with IEEE 802.15.4 , 2003 .

[15]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[16]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[17]  Dennis G. Abraham,et al.  Transaction Security System , 1991, IBM Syst. J..

[18]  Philip Levis,et al.  Maté: a tiny virtual machine for sensor networks , 2002, ASPLOS X.

[19]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Attacks on Wireless Sensor Networks , 2006, Sicherheit.

[20]  Andrew Hutchison,et al.  Ticket Based Identity System for DRM , 2006, ISSA.

[21]  Frank Swiderski,et al.  Threat Modeling , 2018, Hacking Connected Cars.

[22]  Felix C. Freiling,et al.  On the Feasibility and Meaning of Security in Sensor Networks , 2005 .

[23]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[24]  Sungyoung Lee,et al.  Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).