9
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
Assumptions
§Simplex RF hardware is used (can either transmit or receive radio signals but not both)
§Nodes are assumed to be physically vulnerable and can be compromised
§Attacker can be present in the network from the beginning of network formation
§Attacker’s computing platform can be much more powerful than that of the WSN nodes
–We still consider attack difficulty and the benefit to the attacker of a successful attack (ETSI attack model)
§