23
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
Conclusions and Future Work
§Shown how RF Fingerprints can be used in a distributed WSN
–Shown how to use physical layer RF Fingerprints to produce ‘data layer’ credentials
§Protocol allows secure, resilient aggregation of RF Fingerprint measurements from multiple sources
§Practicality needs to be demonstrated
§Formal Security needs to be proved