18
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
RF Fingerprint Exchange
§Objective: Exchange RF Fingerprint information in a confidential fashion only with active participants to improve accuracy and consistency
–Encryption serves more to commit (in a non-repudiable fashion) participants using both their secret keys and their RF Fingerprints simultaneously
–Encrypted communications serves a similar purpose for their guarantors
1.Nodes encrypt communications using the shared conference key value
2.Nodes broadcast the (first round) FP values that were gathered for each neighbour
3.All nodes check to make sure that the values are consistent with their hashes
4.Nodes also record a third (and final) RF Fingerprint value