§We
propose a method to bind RF fingerprints to more standard existing
cryptographic mechanisms (binding the physical layer to the ‘data
layer’)
–Based
on a method proposed by Burmester and Desmedt in 1998 for establishing a group
conference key
–Allows
neighbour discovery to take place
§Practical
implementation issues for WSNs are considered:
–Distributed
solution proposed (no online or centralized Trusted Authority is required)
–‘Noisy’
RF fingerprints can still be used for authentication
–Attacks
on authentication using RF Fingerprints are briefly presented