§Attacker
has different radio channels than the one between the legitimate
transmitter and receiver
–Channel differences can be used to advantage by honest nodes
to identify changes in the legitimate channel
–Some
researchers have shown how to extract common random reference
strings from a radio channel
–Channels
are different between other nodes, including non-attacking ones
§Noise:
–Environmental
sources
–Attacker-induced
(e.g. jamming and more subtle types)
–Electrical
and thermal sources inside nodes