RF Fingerprints for Secure Authentication in WSN

WSN Authentication

RF Fingerprints for WSN Authentication

Presentation Outline

Motivation – “Aging in Place”

Authentication is Required for the ‘Aging in Place’ Application

Our Contributions

Requirements

Assumptions

Authentication

Related Work – WSN Authentication and RF Fingerprints

Basic Channel Model

RF Fingerprints

Idea – Binding Physical Layer to Data Layer

Neighbour Discovery with RF Fingerprints

Conference Key Creation (1)

Conference Key Creation (2)

RF Fingerprint Exchange

Secure RF Fingerprint Aggregation

RF Fingerprint Credential - Usage

Advantages and Disadvantages

Attacks and Defenses

Conclusions and Future Work

Questions?