§Sybil
attack
–Without Trusted Authorities, credential forgery
prevented using requirement that RF Fingerprints
‘demonstrated’ during the showing process.
§Masquerading
–Attacking nodes needs knowledge of secrets and compatible
RF Fingerprints
§Signal-Summing
(for corruption of RF Fingerprints)
–Unsure whether such an attack is feasible; needs
investigation
§DOS/Jamming
–RF Fingerprints can be used to identify the attacker,
provided all communications are not blocked
§False RF
Fingerprint reporting
–Our protocol is intended to prevent this
§Fingerprint
Forgery
–We assume that this is not possible or very difficult;
needs investigation