 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
§ |
Objective:
Exchange RF Fingerprint information in a confidential
|
|
|
fashion
only with active participants to improve accuracy and
|
|
|
consistency
|
|
|
|
– |
Encryption
serves more to commit (in a non-repudiable fashion) participants
using
|
|
|
both
their secret keys and their RF Fingerprints simultaneously
|
|
|
|
– |
Encrypted
communications serves a similar purpose for their guarantors
|
|
|
1. |
Nodes
encrypt communications using the shared conference key
|
|
|
value
|
|
|
2. |
Nodes
broadcast the (first round) FP values that were gathered for
|
|
|
each
neighbour
|
|
|
3. |
All
nodes check to make sure that the values are consistent with
|
|
|
their
hashes
|
|
|
4. |
Nodes
also record a third (and final) RF Fingerprint value
|
|