19
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
Secure RF Fingerprint Aggregation
§Objective: In a secure fashion, agree on the RF Fingerprint value and the permitted error tolerance for the RF Fingerprint measurement
–At each node, we now have:
§A defined group of fully-connected participants who followed the previous protocol steps
§A shared group key, whose knowledge requires group membership
§Three RF Fingerprint samples for each neighbour in the group
–An error tolerance threshold (calculated now and used now for consistency purposes)
§Linked cryptographic keys and RF Fingerprints for all group members
1.The initiator node can create an aggregated credential using all of this information and distributes it to the group for validation
2.The other nodes verify that their RF Fingerprint measurements are within the specified error tolerance threshold and then sign it (or provide an error tolerance value for which they could sign and then abort with their reason)
3.Steps 1 to 2 are repeated until the initiator has a set of signers with tight enough error tolerance.