A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

10Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor network node technologies. The goal of this research was to determine "Security Lessons" learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa. © IFIP International Federation for Information Processing 2007.

Cite

CITATION STYLE

APA

Eagles, K., Markantonakis, K., & Mayes, K. (2007). A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4462 LNCS, pp. 161–174). Springer Verlag. https://doi.org/10.1007/978-3-540-72354-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free