§Objective: In
a secure fashion, agree on the RF Fingerprint value and the permitted error tolerance for the RF Fingerprint
measurement
–At
each node, we now have:
§A defined group of fully-connected participants who
followed the previous protocol steps
§A shared group key, whose knowledge requires group
membership
§Three RF Fingerprint samples for each neighbour in the
group
–An
error tolerance threshold (calculated now and used now for consistency
purposes)
§Linked cryptographic keys and RF Fingerprints for all group
members
1.The initiator node can create an aggregated credential
using all of this information
and distributes it to the group for validation
2.The other nodes verify that their RF Fingerprint
measurements are within the
specified error tolerance threshold and then sign it (or provide an error tolerance value for which they could sign and
then abort with their reason)
3.Steps 1 to 2 are repeated until the initiator has a set
of signers with tight enough error
tolerance.