22
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
Attacks and Defenses
§Sybil attack
–Without Trusted Authorities, credential forgery prevented using requirement that RF Fingerprints ‘demonstrated’ during the showing process.
§Masquerading
–Attacking nodes needs knowledge of secrets and compatible RF Fingerprints
§Signal-Summing (for corruption of RF Fingerprints)
–Unsure whether such an attack is feasible; needs investigation
§DOS/Jamming
–RF Fingerprints can be used to identify the attacker, provided all communications are not blocked
§False RF Fingerprint reporting
–Our protocol is intended to prevent this
§Fingerprint Forgery
–We assume that this is not possible or very difficult; needs investigation