Conclusions to my research:

1) Conclusion to my smart card and wireless sensor network node comparison work - 2006:

This research proposes a novel framework and methodology for classifying and analysing threats, the TVAC Table and the CTAAM, that may have wider applicability (e.g., Java Card 3.0 & RFIDs).

Attacks against smart card integrated circuits apply to WSN nodes and some WSN node RF/Communications attacks may apply to contactless smart cards and RFIDs. High, Medium and Low assurance Tamper resistance features within smart cards should be considered for WSN nodes.

I have also defined two new definitions for attacks, i) Cessation of Service (CoS) and/or a ii) Distributed Cessation of Service (DCoS).

Suggested further areas of research:

RF/Communications threats between WSN nodes and Mobile Cell Phones.

A study of WSN nodes and sensor technologies in airports to assist baggage and passenger screening.

An assessment of smart card services/functionalities such as Global Platform and Card Manager, Java Card Runtime Environment (JCRE) and smart card APIs to determine applicability to WSN nodes.

Alternative Authentication mechanisms for WSN nodes: (Attribute Certificates/Kerberos tickets). I am interested in investigating a secure authentication and routing protocol similar to IPSEC which I have provided a working label of KAFKA (Know Allies & Family, Know Adversaries) to suit the adaptive nature of Wireless Sensor Networks.