Conclusions to my research: 1) Conclusion to my smart card and wireless sensor network node comparison work - 2006: This research proposes a novel framework and methodology for classifying and analysing threats, the TVAC Table and the CTAAM, that may have wider applicability (e.g., Java Card 3.0 & RFIDs). Attacks against smart card integrated circuits apply to WSN nodes and some WSN node RF/Communications attacks may apply to contactless smart cards and RFIDs. High, Medium and Low assurance Tamper resistance features within smart cards should be considered for WSN nodes. I have also defined two new definitions for attacks, i) Cessation of Service (CoS) and/or a ii) Distributed Cessation of Service (DCoS). Suggested further areas of research: RF/Communications threats between WSN nodes and Mobile Cell Phones. A study of WSN nodes and sensor technologies in airports to assist baggage and passenger screening. An assessment of smart card services/functionalities such as Global Platform and Card Manager, Java Card Runtime Environment (JCRE) and smart card APIs to determine applicability to WSN nodes. Alternative Authentication mechanisms for WSN nodes: (Attribute Certificates/Kerberos tickets). I am interested in investigating a secure authentication and routing protocol similar to IPSEC which I have provided a working label of KAFKA (Know Allies & Family, Know Adversaries) to suit the adaptive nature of Wireless Sensor Networks. |