Presentation Outline
§ Context for our work
Application Assumptions and Requirements
Related Work for WSN Authentication and RF Fingerprints
§ Our main Contributions:
Definition of a process to bind the physical layer to higher cryptographic layers in a
WSN
WSN Authentication Attacks
§ Conclusions and Future Work