|
|
|
|
|
|
|
|
|
|
|
|
§ |
Context
for our work
|
|
|
|
– |
Application
Assumptions and Requirements
|
|
|
|
– |
Related
Work for WSN Authentication and RF Fingerprints
|
|
|
§ |
Our
main Contributions:
|
|
|
|
– |
Definition
of a process to bind the physical layer to higher cryptographic layers in a
|
|
|
WSN
|
|
|
|
– |
WSN
Authentication Attacks
|
|
|
§ |
Conclusions
and Future Work
|
|