8
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
Requirements
§No key pre-configuration should be required by the user or by the manufacturer
§Little or no user involvement should be required
–New nodes need to be added as old ones stop working (e.g. may be needed because of dead batteries or failure, since WSN nodes could be cheap items)
§No direct connection to Trusted Authority should be required
§Forward Secrecy should be provided