7
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
Our Contributions
§We propose a method to bind RF fingerprints to more standard existing cryptographic mechanisms (binding the physical layer to the ‘data layer’)
–Based on a method proposed by Burmester and Desmedt in 1998 for establishing a group conference key
–Allows neighbour discovery to take place
§Practical implementation issues for WSNs are considered:
–Distributed solution proposed (no online or centralized Trusted Authority is required)
–‘Noisy’ RF fingerprints can still be used for authentication
–Attacks on authentication using RF Fingerprints are briefly presented