 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
§ |
We
propose a method to bind RF fingerprints to more standard
|
|
|
existing
cryptographic mechanisms (binding the physical layer to the
|
|
‘data
layer’)
|
|
|
|
– |
Based
on a method proposed by Burmester and Desmedt in 1998 for establishing a
|
|
|
|
group
conference key
|
|
|
|
– |
Allows
neighbour discovery to take place
|
|
|
§ |
Practical
implementation issues for WSNs are considered:
|
|
|
|
– |
Distributed
solution proposed (no online or centralized Trusted Authority is
|
|
|
|
required)
|
|
|
|
– |
‘Noisy’
RF fingerprints can still be used for authentication
|
|
|
|
– |
Attacks
on authentication using RF Fingerprints are briefly presented
|
|