20
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
RF Fingerprint Credential - Usage
§Objective: Generate a credential using the aggregated RF Fingerprint information for a given subject node
§Credential is generated by a specific set of nodes in a particular neighbourhood
–Identification information for those nodes is included in the credential
§Resulting Credential can be ‘shown’ by the subject node outside the neighbourhood within which it was generated
§RF Fingerprints of the referees are also included in the Credential
–RF Fingerprints of the referees can only be verified by other neighbours, but not required to be in the same neighbourhood as the one used for credential generation.
–A reputation or trust system is required to monitor the behaviour of nodes, but this system requires the identifying information from the credentials.
§The method for showing the credential is not discussed in the paper.
–
§