RF Fingerprints for
Secure Authentication in WSN
WSN Authentication
RF Fingerprints for WSN
Authentication
Presentation Outline
Motivation – “Aging in
Place”
Authentication is
Required for the ‘Aging in Place’ Application
Our Contributions
Requirements
Assumptions
Authentication
Related Work – WSN
Authentication and RF Fingerprints
Basic Channel Model
RF Fingerprints
Idea – Binding Physical
Layer to Data Layer
Neighbour Discovery with
RF Fingerprints
Conference Key Creation
(1)
Conference Key Creation
(2)
RF Fingerprint Exchange
Secure RF Fingerprint
Aggregation
RF Fingerprint Credential
- Usage
Advantages and
Disadvantages
Attacks and Defenses
Conclusions and Future
Work
Questions?